US20060004860A1 - Method for checkpointing a main-memory database - Google Patents

Method for checkpointing a main-memory database Download PDF

Info

Publication number
US20060004860A1
US20060004860A1 US10/851,214 US85121404A US2006004860A1 US 20060004860 A1 US20060004860 A1 US 20060004860A1 US 85121404 A US85121404 A US 85121404A US 2006004860 A1 US2006004860 A1 US 2006004860A1
Authority
US
United States
Prior art keywords
page
data object
pending
data
secondary storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/851,214
Other versions
US7587429B2 (en
Inventor
Antti-Pekka Liedes
Petri Soini
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IBM Finland Oy AB
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/851,214 priority Critical patent/US7587429B2/en
Assigned to SOLID INFORMATION TECHNOLOGY OY reassignment SOLID INFORMATION TECHNOLOGY OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LIEDES, ANTTI-PEKKA, SOINI, PETRI
Publication of US20060004860A1 publication Critical patent/US20060004860A1/en
Application granted granted Critical
Publication of US7587429B2 publication Critical patent/US7587429B2/en
Assigned to OY INTERNATIONAL BUSINESS MACHINES AB reassignment OY INTERNATIONAL BUSINESS MACHINES AB MERGER (SEE DOCUMENT FOR DETAILS). Assignors: SOLID INFORMATION TECHNOLOGY OY
Assigned to OY INTERNATIONAL BUSINESS MACHINES AB reassignment OY INTERNATIONAL BUSINESS MACHINES AB CORRECTIVE ASSIGNMENT TO CORRECT THE ERROR IN THE RECEIVING PARTY ADDRESS IN A COVER SHEET PREVIOUSLY RECORDED ON REEL 025486 FRAME 0469. ASSIGNOR(S) HEREBY CONFIRMS THE RECEIVING PARTY IBM, HAS RECEIVED THE ENTIRE RIGHT, TITLE AND INTEREST IN ALL OF THE PATENTS AND APPLICATIONS OWNED BY SOLID. Assignors: SOLID TECHNOLOGY OY
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1474Saving, restoring, recovering or retrying in transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1471Saving, restoring, recovering or retrying involving logging of persistent data for recovery
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/82Solving problems relating to consistency
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability

Definitions

  • the database management system is a facility for storing large volumes of data and allowing multiple users to access and manipulate the data in an efficient and controlled fashion.
  • Databases are traditionally considered as a large collection of (mainly disk-resident) shared data, managed and accessed by the DBMS.
  • a database management system is an entity, which comprises one or more databases and/or data management systems, whereby the system is responsible for reading the data structures contained in the database and/or data management systems and for changing these data structures.
  • a database is an information structure, which comprises one or more data objects, and the use of which is controlled by the DBMS.
  • a data object is an information structure, which can comprise other data objects or such data objects, which can be construed as atomary data objects.
  • data objects represent tables comprising rows.
  • the rows comprise fields, which are typically atomary data objects.
  • a tuple is the data object that may contain other objects as elements, e.g. a tuple may be one row containing single customer's data in a table.
  • a database operation is an event, during which data objects of the database are read from the database, during which data objects are modified, during which data objects are removed from the database, and/or during which data objects are added to the database.
  • a set of database operations acting on the data objects is called a transaction.
  • the transaction may comprise one or multiple operations.
  • the transaction can also comprise other transactions.
  • a page is a collection of data objects.
  • a page may contain zero, one or multiple data objects. At maximum, the page may contain all data objects of the storage.
  • a checkpoint is a process where altered pages are written from one storage unit, such as RAM to another storage unit such as Disk.
  • the end-result of a checkpoint is a snapshot of a database on the disk.
  • the database server comprises a primary storage unit 10 and a CPU unit 13 .
  • the database file unit 16 is a disk-based system where the persistent database data resides and it is called a secondary storage.
  • the application software unit 11 communicates with the database server 12 using appropriate programming interface, e.g. Structured Query Language (SQL), transactions (a in FIG. 1 ) being able to access the primary storage.
  • SQL Structured Query Language
  • transactions a in FIG. 1
  • a transaction log 18 in the secondary storage will be up-dated appropriately if transaction logging feature has been switched on.
  • the database server 12 comprises a disk unit as a primary storage unit 16 and a random access memory (RAM) unit as a cache memory unit 10 .
  • the RAM unit is used as a buffer cache to the actual data on the disk of the disk unit 16 . If the accessed data is not in the cache, it has to be fetched from the disk and it may take several milliseconds for the disk to seek and fetch the data.
  • These disk-based relational DBMSs are also called disk-resident DBMSs, abbreviated as DRDBMS. To generalize, in DRDBMSs the data resides on the disk and is cached into RAM.
  • MMDBMS Today main-memory DBMSs, abbreviated as MMDBMS, are streghtening their position. Both terms main-memory and in-memory are widely used and they mean the same thing in the context of DBMSs.
  • the database server 12 comprises a random access memory (RAM) unit as a primary storage unit 10 where all data of the database is stored.
  • the disk unit containing database files 16 and transaction logs 18 provides a persistent backup of the data of the database.
  • RAM random access memory
  • the data resides in RAM and is backed up to the disk.
  • This present application concerns MMDBMSs.
  • RAM With ever increasing RAM sizes in modern computers, there has been a rise given to the database residing entirely in the main-memory RAM instead of disks. Compared to the disk, the RAM offers superior performance by offering much better access times in the range of hundred nanoseconds on the average. Also the maximum access time for the RAM is easy to define, whereas for the disk having a physically moving read/write head, this is difficult to accomplish. Disks are block-oriented meaning that reading and writing a relatively large amount of data has the same, high cost as reading or writing a single byte. For RAM the optimum access patterns are decided by cache memory units but a typical cache line size is very small, from tens of bytes to a couple of hundred bytes.
  • RAM means the same as the main-memory, because RAM is the method to implement the main-memory, i.e. the primary storage 10 .
  • the secondary storage 16 is referred to as the disk, even though the disk is only one way to implement it among other block-oriented means having similar properties as disks, e.g. a flash-RAM.
  • the transaction log 18 resides in the secondary storage.
  • the checkpoint in general, is any identifier or other reference that identifies a point in time or a state of the database.
  • the checkpointing can be divided into two major classes, namely transaction consistent and non-consistent checkpointing.
  • transaction consistent checkpoints for all transactions all actions of the transaction are either completely or not at all included.
  • non-consistent checkpoints actions and transactions can be partially included. Because read actions don't modify the data, we can mostly ignore them when considering checkpoints.
  • the checkpointing process is typically a special thread process that periodically performs the checkpointing of the database. There are different ways of triggering the beginning of the checkpoint, e.g. it can start whenever the transaction log has accumulated a predetermined amount of records since the previous checkpoint.
  • backup is often used as a synonym for the checkpointing of especially main-memory databases.
  • FIGS. 2 a - 2 c there is depicted a common database structure for modifying and checkpointing data in the relational MMDBMS according to the prior art.
  • the primary storage contains a page A 101 comprising a page header 102 and data objects 103 , e.g. in this case DO 1 , DO 2 and DO 3 .
  • the page A may contain a plurality of data objects but in this example a set of three data objects is used for simplicity.
  • the page A may not actually be a physical contiguous area of the main-memory but it is in a form of a logical page which is a linked list of data objects floating around the main-memory,
  • the writing of the pages of the checkpoint is a time consuming process during which, there may be transactions that need to modify the data of the pages of the check-point, for example updating one or multiple data objects on the page A.
  • the modification of data objects of the page A in transaction level is omitted from FIGS. 2 a - 2 c for simplicity.
  • FIG. 2 b shows a situation in the storage level the first step of a typical checkpointing method for a main-memory database.
  • the checkpointing process starts processing the page A the page is copied in the primary storage so that the page A is presented as a physical page 105 forming a physical contiguous area of the main-memory in primary storage 10 .
  • the page A 105 comprises data objects DO 1 , DO 2 and DO 3 arranged contiguously in a sequential order.
  • the checkpointing process writes the page A to the secondary storage 16 . As shown in FIG.
  • the page A 101 is finally written as a physical page A 109 to the memory space 107 of the disk file, where the page A 109 contains rows and each row contains one data object DO 1 , DO 2 and DO 3 .
  • the page A 101 is written as the page A 109 to the secondary storage, it means that the page A 109 is a back-up copy of the page A 101 .
  • the transactional modification is quiesced until the checkpoint has completed writing the page(s) that the transaction needs to modify.
  • the page A 101 can be modified, e.g. by a transactional update, in the primary storage.
  • the modification of the page A is cancelled during the checkpointing and the modification has to wait until the checkpointing of the page A is completed.
  • the checkpointing is not consistent if the page A is written (terms copied or dumped area also used) to the disk while transactions are allowed to modify any data on the page A during the checkpointing.
  • the checkpointing may be partially consistent, e.g. action consistent, but transaction consistent checkpointing provides all actions of the transaction to be consistent. Otherwise the checkpointing as a whole is considered non-consistent. Consequently, if a consistent checkpointing is a requirement, then during the consistent checkpointing the data to be modified is locked in the main memory (primary storage) for writing to the disk (secondary storage). Thus, transactions are not able to perform write operations without waiting for the disk access which slows down is database operations and a constraint for real-time operation is not met.
  • FIG. 3 a also shows a situation in the storage level, when the first transactional modification to the page B occurs.
  • the page B 101 is copied in the primary storage to a page B′ 101 a .
  • the page B 101 comprises data objects DO 4 , DO 5 and DO 6 that need to be written to the secondary storage in the checkpoint.
  • the transactional request for page modification for example adding or removing a data object 103 on the page B′ 101 a
  • the transactional modification of the page B is allowable during the checkpointing.
  • the current page B is copied to the main memory (primary storage) as a page B′ 101 a which is initially an identical copy to the page B.
  • the page B′ comprising data objects DO 4 , DO 5 , DO 6 may be altered by transactional operations such as add or remove a data object.
  • the transactional request for page modification for example updating the data object DO 4 on the page B′ to be replaced by a new data object DO 4 ′ is allowed.
  • the transactional modification is performed to page B′ 101 a , i.e. the data object DO 4 will be replaced by the new data object DO 4 ′ in this exemplary case.
  • the page B′ first comprises data objects DO 4 , DO 4 ′, DO 5 , DO 6 as shown in a dash-lined box of page B′ 101 a in FIG.
  • the page B′ 101 a comprises data objects DO 4 ′, DO 5 , DO 6 as shown in a block of page B′ 101 b in FIG. 3 a .
  • the page B′ 101 b comprises data objects DO 4 ′, DO 5 , DO 6 and the page B 101 data objects DO 4 , DO 5 , DO 6 .
  • this main memory resources are spent for both these page copies for a period of time until the checkpointing process has written the page B 101 to the secondary storage.
  • the checkpointing process When the page B 101 is being checkpointed, the checkpointing process writes the page B 101 to the secondary storage 16 .
  • the original page B 101 is written as a physical page B 109 to the memory space 107 of the disk file, where the page B 109 resides containing data objects DO 4 , DO 5 and DO 6 , i.e. it contains data of the original page B.
  • the page B 101 is written as the page B 109 to the secondary storage, it means that the page B 109 is a back-up copy of the page B 101 of the primary storage.
  • the page B′ 101 a , 101 b is already or it can be modified, e.g.
  • An optional transaction log 18 as shown in FIG. 3 d lists information on all transactional modification that have been committed during the database processing.
  • the consistent checkpointing of the page 101 while a request for modification of the page occurs during the checkpointing, is guaranteed by using those two methods described above.
  • the first method for ensuring the consistent checkpointing is depicted in FIGS. 2 a - 2 c , where the modification of the page A is deferred during the checkpointing and the modification has to wait until the checkpointing is completed.
  • the second method for ensuring the consistent checkpointing is depicted in FIGS. 3 a - 3 d , where the request for modification of the page B involves the page B to be copied to the main memory (primary storage) as a page B′ which is initially an identical copy to the page B. After the copy of the page B, as the page B′, is ready in the primary storage, the transactional modification is performed to page B′.
  • FIGS. 4 a - 4 d show a way of the prior art to make a so-called non-consistent checkpointing while modifying data during checkpointing the relational MMDBMS.
  • the primary storage contains a page C 101 comprising a page header 102 and a number of data objects 103 , e.g. in this case DO 7 and DO 8 in a form of a logical page as described earlier.
  • a transactional request for page modification for example up-dating a data object 103 on the page C.
  • the request is accepted and the transactional modification of the page C is allowable during the checkpointing.
  • the transactional request for page modification for example updating the data object DO 7 on the page C to be replaced by a new data object DO 7 ′ is allowed.
  • the transactional modification is performed to the page C 101 , i.e. the data object DO 7 will be replaced by the new data object DO 7 ′ and in pursuance of replacing the data object DO 7 by DO 7 ′ it is also removed from the page C.
  • the transactional modification is also committed at the transaction level.
  • the page C 101 comprises data objects DO 7 ′, DO 8 as shown in a block of page C 101 b in FIG. 4 a .
  • FIG. 4 b shows a situation in the storage level, when the first transactional modification to the page C occurs and the physical page C 105 as described earlier comprises now data objects DO 7 ′ and DO 5 .
  • the checkpointing process writes the page C 105 to the secondary storage 16 , the backup copy of the page C 109 is not consistent with the original page C 101 .
  • the inconsistent pages of the database must be “repaired” with information about transactions that occurred during the checkpoint.
  • An exemplary transaction log 18 as shown in FIG. 4 d lists information on all transactional modification during the checkpointing to the secondary storage. Each row 118 of the transaction log contains following information concerning one transaction: a link to page C, an old version of the data object modified and a new version of the data object modified.
  • This kind of transaction log of prior art is a physical undo-redo log, by means of which the database must be processed to be able to recover to the latest checkpoint.
  • the aforesaid method of the prior art does not fulfil these requirements, because ensuring the consistent checkpointing of the page the modification of the page is stopped during the checkpointing and it has to wait until the checkpointing is completed.
  • the problem is that at the transactional level the modification operations are blocked during propagating the checkpointing at the storage level and consequently the real-time response for all database operations, especially write operations, is not guaranteed. This causes considerable delays to transaction level processing.
  • Still another disadvantage in prior art checkpointing is the need to use a transaction log for recover the database.
  • the traditional approach to the persistency in DBMSs is checkpointing and transaction logging.
  • the checkpointing of prior art is tightly coupled to the transaction logging.
  • the transaction log, in particularly a physical undo-redo log, which is written to the secondary storage, must be processed to be able to recover from the latest checkpoint.
  • the requirement of always using transaction logging to ensure database consistency is not always acceptable from the applications point of view primarily because transaction logging causes significant performance degradation of write transactions because all transactions must be successfully written to the disk upon transaction commit.
  • the problems set forth above are overcome by providing a consistent checkpointing of a main-memory storage, preferably a main-memory database, without disturbing the transaction level processing.
  • the object of the invention is achieved by providing a method for making a consistent checkpoint of a main-memory storage, wherein a data object to be modified on the page comprising at least one data object is copied in the main-memory during the checkpointing, instead of the whole page to be copied.
  • Another object of the invention is achieved by providing a programmable software product thereto.
  • a method comprises a step of altering at least one data object of said page is a pending operation of addition of the data object to the page.
  • a method comprises a step of altering at least one data object of said page is a pending operation of removal of the data object from the page.
  • a data object with a pending add operation is directly removed or modified by a remove or a commit operation.
  • a method comprises a step wherein the removed data object along with information related to the pending operation is moved from the page to a separate pending removals page in the primary storage.
  • FIG. 1 a depicts a common relational DBMS arrangement for storage level and transaction level processing according to prior art.
  • FIG. 1 b depicts a common relational DBMS arrangement for storage level and transaction level processing according to the invention.
  • FIGS. 2 a - 2 c depicts a block diagram of making a consistent checkpoint of the database according to prior art.
  • FIGS. 3 a - 3 d depicts another block diagram of making a consistent checkpoint of the database according to prior art
  • FIGS. 4 a - 4 d depicts a block diagram of making a non-consistent checkpoint of the database according to prior art
  • FIGS. 5 a - 5 d depicts a block diagram of making a consistent checkpoint of the database according to an embodiment of the invention.
  • FIG. 6 depicts a basic structure of data at the storage level according to the invention.
  • FIGS. 7 a - 7 e depicts a block diagram of a performance of the pending operations on the page in the primary storage according to the invention.
  • FIGS. 8 a - 8 d depicts a block diagram of making a consistent checkpoint of the database according to another embodiment of the invention.
  • FIGS. 9 a - 9 b depicts a block diagram of recovering a primary data storage from the secondary data storage according to another embodiment of the invention.
  • FIG. 1 b a relational database management system (DBMS) arrangement
  • DBMS relational database management system
  • a relational DBMS arrangement according to the invention has a data-base server 12 comprising the primary storage 10 and database file unit 16 being the secondary storage.
  • the general database processing is similar to as described in accordance with FIG. 1 a .
  • the primary storage 10 is formed of pages, typically arranged into a doubly linked list.
  • the page is in a form of a logical page which is a list of data objects floating around the main-memory.
  • a memory location 15 is allocated in the main-memory for a disk page which represents a page on the disk.
  • the page is presented as a physical page 10 a forming a physical contiguous area of the main-memory.
  • the disk page 105 a has two things, firstly it is a buffer 115 for the page image on the disk and secondly a location of the disk page on the disk.
  • the physical page 105 a is allocated for the disk page as the disk page is created.
  • the data objects are copied into the buffer 115 of the disk page, the buffer is written to the disk (secondary storage) and released after writing. This is the only time the pages exist in their physical representation in the main-memory (primary storage).
  • a cyclic buffer 115 for the disk page 105 a is used.
  • a transaction log 18 is depicted as an option. Connections a, b and c are descripted in pursuance of FIG. 1 a.
  • each page contains a “dirty flag”, which is set whenever the page is modified, and cleared when the checkpointing process writes the page to the disk.
  • the pages to be backed up are those that are dirty when the checkpoint begins; any page that becomes dirty while the checkpointing is already on its way must not be backed up if a consistent checkpoint is desired While a new checkpoint is underway, the old checkpoint must remain valid until the new checkpoint is finished successfully. To accomplish this, the dirty pages are written to new locations on the disk and their old versions from the previous checkpoint remain valid to keep the old checkpoint consistent.
  • the “add data object” adds a new data object to the storage.
  • the new data object may be a completely new data object, a new version for an existing data object, or a delete mark for an existing data object.
  • the data objects are added as tentative, i.e. not transaction committed, data objects.
  • the “remove data object” removes an existing data object, and the “commit data object” marks a data object as committed, i.e. non-tentative.
  • “Update” and “delete” statements create new versions of the previously existing data objects, whereas “insert” statement creates completely new data objects. If more than one version of a certain data object is made within a transaction, e.g. a row is updated twice, the latest successfully statement committed version of each data object will be transaction committed If the transaction committed version is a delete mark, the data object is removed from the database.
  • new versions of data objects are made by creating a new, altered copy of the previous version of the data object. Consequently, transaction and statement aborts are easy, just by forgetting the new versions and reverting the previous ones.
  • the old versions of data objects must be readily available because other transactions must not see the data written to the database by another concurrently active transaction.
  • a delete mark is a special data object. When the delete mark is transaction committed, the old transaction committed version and the delete mark cancel each other out. It is necessary to represent as a data object with enough information to locate the corresponding actual data object, because we need to find which data object is meant to delete in recovery. Old versions are only removed at transaction commit or abort.
  • FIGS. 5 a - 5 d there is depicted a database structure according to an embodiment of the invention to make a consistent checkpointing while modifying data during checkpointing the relational MMDBMS.
  • the primary storage contains a page D 101 comprising a page header 102 and a set of data objects 103 , e.g. in this case DO 9 , DO 10 and DO 11 .
  • the page D 101 contains some changes since the previous checkpoint and is therefore marked as a ‘dirty page’ that needs to be checkpointed.
  • the page D is in a form of a logical page which is a list of data objects DO 9 , DO 10 , DO 11 floating around the main-memory.
  • the page D is included in the current checkpoint but it is not yet written to the secondary storage.
  • the pages to be backed up during this current checkpoint are “frozen” in the beginning of the checkpointing.
  • the freezing step is atomic with respect to any actions on the primary storage, and any transaction commit or abort.
  • Pending operation is an addition or removal of a data object so that the data object becomes visible to the transactions accessing the database but the concurrently ongoing checkpointing process takes special action on these data objects such as excluding the pending data from the data to be checkpointed.
  • the disk space 107 of the secondary storage 16 contains the data objects from this checkpoint. Meanwhile the transactional request for page modification, for example updating a data object 103 on the page D, is accepted and consequently, the transactional modification of the page D is allowable during the checkpointing.
  • Updating a data object at database page level is a combination of add and remove operations.
  • the added data object i.e. the data object DO 9 ′ is supplemented with the pending add (PA) status information.
  • the information about the new pending operation may also be added to a list of pending operations (not shown)
  • the current version version of the data object to be updated i.e. the data object DO 9 is marked with pending remove (PR) data object from the list of pending operations (not shown).
  • the pending add operation may be also called the pending insert operation, and the pending remove operation may be called the pending delete operation meaning the same thing respectively.
  • the new data object DO 9 ′ is added to the page and marked with the pending add (PA) state information.
  • the state information may for example be a flag in the data object itself and/or an entry in a list of pending operations. Because this example is about updating the data object DO 9 with a new value (DO 9 ′), the original DO 9 data object is marked with pending remove information.
  • the checkpointing process starts writing the page D to the buffer location 105 a in the disk buffer memory area 115 , the checkpointing process includes only those data objects from the page that do not have a pending add operation information attached to them.
  • the checkpointing process Upon completing writing the page D 101 a to the buffer 105 a and further to the secondary storage 16 , the checkpointing process finalises the pending operations of the page D 101 a by removing the original DO 9 and permanently adding the DO 9 ′ to the list of data objects on the page D. The pending status of the added data object DO 9 ′ is removed as well.
  • a physical page D 109 in the secondary storage 16 resides in the memory space 107 of the disk file.
  • the data of the disk page D 109 is identical to the content of the buffer 105 a .
  • it contains data objects DO 9 , DO 10 and DO 11 , i.e. it is the consistent backup of the original page D 101 in the secondary storage.
  • the checkpointing process alters the pending operations to be actual data on the page D as described later on.
  • the data object DO 9 is replaced by the new data object DO 9 ′ and the data object DO 9 is removed in this exemplary case.
  • a link between data objects DO 9 and DO 10 is broken up and a new link between data objects DO 9 and DO 9 ′ and DO 9 ′ and DO 10 is opened up.
  • the data objects DO 9 , DO 9 ′, DO 10 and DO 11 remain until the page is checkpointed. The extra memory resources are spent only for the data object 009 ′, not for the whole page.
  • the pending operations can be made official, creating the page D 101 b comprising data objects DO 9 ′, DO 10 , DO 11 linked together as shown in FIG. 5 a.
  • An optional transaction log resides in the secondary storage which lists information on all transactional modifications that have been committed during the database processing.
  • the transaction log contains information about the write operations such as add and remove a data object or commit a transaction.
  • the transaction logging is not coupled with the checkpointing process.
  • the method present here produces a consistent checkpoint also without transaction logs.
  • FIG. 5 d shows a situation of the page D 101 a if another transactional update on DO 9 ′ is performed and while the page D is still frozen, the update is performed directly.
  • DO 9 ′ already has a pending add operation on it, and is thus excluded from the checkpoint, and thus further altering it does not interfere with the consistency of the checkpoint.
  • a transaction requests an update of DO 9 ′ to DO 9 ′′.
  • the new data object DO 9 ′′ is added to page D as a pending operation.
  • the old version DO 9 ′ is directly removed, even if the page is frozen.
  • the page D 101 b comprises data objects DO 9 ′′, DO 10 , DO 11 linked together as shown in FIG.
  • FIG. 5 d The physical page produced by checkpointing the page D is depicted in FIG. 5 d is exactly the physical page depicted in FIG. 5 c .
  • the DO 9 ′ is removed or committed by a transaction, the removal or commit is performed directly without a pending operation and the physical page produced from page D remains the one shown in FIG. 5 c.
  • each page P 101 contains a page header 102 and a set of data objects DO 103 for example in a doubly linked list (lines e, f).
  • the pages 101 are arranged into a doubly linked list (line j).
  • the data objects 103 are pointed to through row objects R 151 from the index structure 1155 , which is used for transactional access to the data objects. This is arranged by a doubly linked list (line h) between rows and data objects.
  • the page of the data object is found from the row object of the data object through a link (line g).
  • the row objects 151 are a special layer connecting the indexes and the data objects by links (line i), and the rows are part of the transaction processing mechanism.
  • the row For each data object linked to the row, the row has also a pointer to the page (not shown) that contains the data object. Each row object presents a distinct value in the index. If more than one version of the data object exist they are all linked to the same row. According to the invention the indexes 155 and row objects 151 are not included into the checkpointing.
  • the pending operations are finalised in the primary storage on the page D 101 a after the page D has been written to the current checkpoint in the secondary storage as shown in FIG. 5 a
  • the new data object DO 9 ′ is marked with the pending add (PA) operation and the current data object DO 9 is marked with pending remove (PR) operation.
  • PA pending add
  • PR pending remove
  • rows R 9 , R 10 and R 11 in a table have data objects: DO 9 , DO 10 and DO 11 , respectively, residing on the frozen page D. This is the situation before the data object is modified.
  • rows and data objects are linked between each other in a way described therein.
  • a transaction T wants to make a new version DO 9 ′ of the current data object DO 9 .
  • the indexing level on top of the rows is left out from FIGS. 7 a - 7 e concerning only the storage level.
  • FIG. 7 b shows the situation after the transaction T has modified the data object DO 9 , i.e. after updating DO 9 .
  • the new data object DO 9 ′ is added to its normal position in the data object list of page D, but it is marked as a pending add and the pending operation is added to the list of pending operations of the page D. Because of the pending add, the data object DO 9 ′ is not yet considered as a “real” member of the page D, which means that DO 9 ′ is not included in the list of data objects to be written to the secondary storage from the page D. This situation is depicted in FIG. 7 b.
  • FIG. 7 c shows the situation after the transaction is committed. Note that after the transaction T commits, the original version of the data object DO 9 , i.e. the previous current data object, is no longer accessible from row R 9 . As T commits, DO 9 ′ is transaction committed, and DO 9 is marked with the pending remove operation (PR).
  • FIG. 7 d shows the situation after the pending add operation of FIG. 7 c has been made permanent and
  • FIG. 7 e shows the situation after the pending remove operation of FIG. 7 d has been made permanent
  • the primary storage contains in this exemplary case a page E 101 comprising a page header 102 and a set of data objects 103 , e.g. in this case DO 12 , DO 13 and DO 14 floating around the main-memory in a form of a logical page.
  • the page E is included in the list of pages belonging to the current checkpoint but it is not yet written to the secondary storage, i.e. it is “frozen” in the beginning of the checkpointing.
  • pending operations are used according to the invention as described earlier.
  • data objects may be added or removed during the checkpoint.
  • the data objects with a pending remove are referred to as pending remove data objects or simply pending removes in the following.
  • the data object DO 12 which is marked with the pending remove (PR) operation is removed (detached) from the page E 101 a and moved to another page G 201 in the primary storage.
  • the page G 201 is called a pending removes page which is a special page for pending remove data objects from different pages.
  • the moved data object DO 12 is linked to information comprising the page or table identity of the page E 101 a from which it was detached.
  • the page G 201 also flushes to the secondary storage at times, when it becomes filled with pending remove data objects.
  • Other possible pending remove data objects 203 e.g. DOX, DOXX etc., linked to their table or page information 205 are shown in FIG.
  • the pending remove data objects can be written to the secondary storage by copying them from the pending removes page to any empty space of a regular physical database page created during checkpointing, and releasing them from the pending removes page in the primary storage after copying.
  • the data object DO 12 is not copied to the buffer location 105 a when the page E is checkpointed, because DO 12 is marked with the pending remove (PR) information.
  • the physical page E 105 a hence contain the data objects DO 13 and DO 14 which will be unchanged during the checkpointing.
  • the checkpointing process writes the buffer location 105 a to page E 109 in the secondary storage 16 as shown in FIG. 5 c and releases the buffer E 105 a thereafter.
  • the physical page E 109 resides in the memory space 107 of the disk file. Once the page G 201 containing pending removes in the primary storage fills up, the checkpointing process may make a copy of it to the buffer 105 b and write the content of the buffer to the page on disk 109 b and release the buffer 105 b and page G 201 for subsequent pending removes.
  • the consistent checkpointing is guaranteed, because the necessary information to bring the pages back to the consistent state resides in the checkpoint itself, stored in the secondary storage.
  • the database is recovered and the consistent checkpointing is guaranteed.
  • the necessary information is the row 119 b from the page G 109 b and the data objects DO 13 and DO 14 from the page E 109 as shown in FIGS. 8 c and 8 d.
  • FIGS. 9 a - 9 b there is depicted a method for recovering the main-memory database in primary storage from a checkpoint that has been stored in the secondary storage according to an embodiment depicted in FIGS. 8 a - 8 d .
  • the physical (disk) pages E and F 109 as well as G 109 b , reside in the memory space 107 of the secondary storage in separate memory locations according to FIG. 9 a .
  • the page E 109 contains data objects DO 13 and DO 14 (see also FIG. 5 c ) and the page F 109 contains DO 15 , DO 16 and DO 17 .
  • the pending add requires no immediate processing, only the pending operation is removed.
  • the data object is already in its right place on the page.
  • the pending remove causes the data object to be removed. This also reduces the amount of space used by the data objects on the page.
  • the pending commit causes the data object to be flagged as committed. This affects the amount of space taken by the data object, because the statement and transaction identities for this data object are no longer needed.
  • a programmable software product for making a consistent checkpoint of a relational main-memory database in a database management system is presented in the following in a form of exemplary software code listings.
  • Simple_Remove performs removing of a tuple from a non-frozen page. It can be called directly when checkpointing is not underway, but is normally called from the Remove function. All changes to the storage are performed directly by the Simple_Remove function shown below. Simple_Remove (page, tuple) page.remove (tuple) free tuple if page.should_join_with (page.predecessor) then page.join_with (page.predecessor) elseif page.should_join_with (page.successor) then page.join_with (page.successor) then page.join_with (page.successor)
  • Add is a generic purpose function of adding a new tuple to a given page.
  • the location of the tuple on the page is indicated by the prev_tuple argument, the new tuple is added after the prev_tuple.
  • the page can be frozen or non-frozen.
  • the Add function is shown below.
  • Remove is a generic purpose function for removing an existing tuple from a given page.
  • the page can be frozen or non-frozen.
  • Make_Checkpoint is a function for making a checkpoint of the database.
  • the checkpoint is typically performed by a checkpoint thread, which calls this function,
  • the Make_checkpoint function is described as follows.
  • disk_page create_disk_page ( ) disk_page.copy_to (page.header) for tuple in page.tuples
  • do tuple pending_op.tuple switch type of pending_op case add: # nothing needs to be done case remove: page.remove (tuple) free pending_op if there were any pending operations then page.
  • the lines 1 to 3 begin a checkpoint by freezing all the currently dirty pages.
  • Lines 4 to 11 produce a physical page for disk writing. A new disk page is allocated, and for all tuples that do not have a pending add the tuple is copied to the disk page.
  • Lines 12 to 19 make any pending operations on the page permanent.
  • Lines 20 to 33 reset the page dirty and frozen statuses and perform any page splits or joins that are required after making the pending operations permanent. If there were any pending operations on the page the page is set dirty otherwise it is clean. All pages are unfrozen.
  • Line 34 writes the just produced physical page to the disk. Lines 4 to 34 are performed to each frozen page in the database, after which the checkpoint is complete.

Abstract

Method for making a consistent checkpoint of a page including at least one data object in a computer system having a primary and secondary storage, and a programmable software. The primary storage has at least one page which includes at least one original data object on the page. The computer system allows at least one write operation to modify at least one data object, and the page is written into the secondary storage during checkpointing. The method includes beginning the checkpointing, including at least one page in the primary storage into a group of pages to be checkpointed, altering at least one data object with at least one data write operation, marking at least one data object resulting from the data write operation, writing at least one of the data objects into the secondary storage, and altering the state of the pending data object to be the original data object.

Description

    TECHNICAL FIELD OF THE INVENTION
  • This invention relates generally to a computer based system comprising a primary and secondary storages and storage level software processes, and more particularly to a main-memory relational database management system (DBMS) and related software processes in which new data is allowed while consistently checkpointing the database.
  • BACKGROUND OF THE INVENTION
  • The database management system (DBMS) is a facility for storing large volumes of data and allowing multiple users to access and manipulate the data in an efficient and controlled fashion. Databases are traditionally considered as a large collection of (mainly disk-resident) shared data, managed and accessed by the DBMS.
  • In this application the following notions are used:
  • A database management system (DBMS) is an entity, which comprises one or more databases and/or data management systems, whereby the system is responsible for reading the data structures contained in the database and/or data management systems and for changing these data structures.
  • A database is an information structure, which comprises one or more data objects, and the use of which is controlled by the DBMS.
  • A data object is an information structure, which can comprise other data objects or such data objects, which can be construed as atomary data objects. For instance, in a relational database data objects represent tables comprising rows. The rows comprise fields, which are typically atomary data objects. A tuple is the data object that may contain other objects as elements, e.g. a tuple may be one row containing single customer's data in a table.
  • A database operation is an event, during which data objects of the database are read from the database, during which data objects are modified, during which data objects are removed from the database, and/or during which data objects are added to the database. A set of database operations acting on the data objects is called a transaction. The transaction may comprise one or multiple operations. The transaction can also comprise other transactions.
  • A page is a collection of data objects. A page may contain zero, one or multiple data objects. At maximum, the page may contain all data objects of the storage.
  • A database table is a collection of zero or more data objects referred to as table rows.
  • A checkpoint is a process where altered pages are written from one storage unit, such as RAM to another storage unit such as Disk. Typically, the end-result of a checkpoint is a snapshot of a database on the disk.
  • Referring to FIG. 1 there is depicted a common relational DBMS arrangement comprising a database server 12 and database file unit 16. The database server comprises a primary storage unit 10 and a CPU unit 13. The database file unit 16 is a disk-based system where the persistent database data resides and it is called a secondary storage. At the transactional level the application software unit 11 communicates with the database server 12 using appropriate programming interface, e.g. Structured Query Language (SQL), transactions (a in FIG. 1) being able to access the primary storage. Once the transaction is successfully finished, i.e. committed (c in FIG. 1), in the database a transaction log 18 in the secondary storage will be up-dated appropriately if transaction logging feature has been switched on. The data-base file 16 and the transaction log file 18 may reside in the same or different disk device. Preferably, the data must be persistent which means that the data is recoverable after a system shutdown. To ensure that the data is persistent in the database there is used checkpointing (b in FIG. 1) to periodically flush changed data from primary storage unit 10 to the database files 16. The purpose of the checkpointing is to provide a snapshot of the data of the database in the database files 16. According to the prior art both the checkpointing and transaction logging are used to recover the data in the database in case of uncontrolled DBMS shutdown which is often referred to as a crash, and can be caused by an application failure, an operating system failure, a hardware failure, or other such failure. The database is thought to be persistent, if after a single fault, i.e. failure in any of the components of the DBMS, the data is recoverable from the secondary storage.
  • In traditional disk-based DBMSs the database server 12 comprises a disk unit as a primary storage unit 16 and a random access memory (RAM) unit as a cache memory unit 10. The RAM unit is used as a buffer cache to the actual data on the disk of the disk unit 16. If the accessed data is not in the cache, it has to be fetched from the disk and it may take several milliseconds for the disk to seek and fetch the data. These disk-based relational DBMSs are also called disk-resident DBMSs, abbreviated as DRDBMS. To generalize, in DRDBMSs the data resides on the disk and is cached into RAM.
  • Today main-memory DBMSs, abbreviated as MMDBMS, are streghtening their position. Both terms main-memory and in-memory are widely used and they mean the same thing in the context of DBMSs. In MMDBMSs the database server 12 comprises a random access memory (RAM) unit as a primary storage unit 10 where all data of the database is stored. The disk unit containing database files 16 and transaction logs 18 provides a persistent backup of the data of the database. To generalize, in MMDBMSs the data resides in RAM and is backed up to the disk.
  • This present application concerns MMDBMSs. With ever increasing RAM sizes in modern computers, there has been a rise given to the database residing entirely in the main-memory RAM instead of disks. Compared to the disk, the RAM offers superior performance by offering much better access times in the range of hundred nanoseconds on the average. Also the maximum access time for the RAM is easy to define, whereas for the disk having a physically moving read/write head, this is difficult to accomplish. Disks are block-oriented meaning that reading and writing a relatively large amount of data has the same, high cost as reading or writing a single byte. For RAM the optimum access patterns are decided by cache memory units but a typical cache line size is very small, from tens of bytes to a couple of hundred bytes.
  • In this application the term RAM means the same as the main-memory, because RAM is the method to implement the main-memory, i.e. the primary storage 10. The secondary storage 16 is referred to as the disk, even though the disk is only one way to implement it among other block-oriented means having similar properties as disks, e.g. a flash-RAM. Also the transaction log 18 resides in the secondary storage.
  • The checkpoint, in general, is any identifier or other reference that identifies a point in time or a state of the database. The checkpointing can be divided into two major classes, namely transaction consistent and non-consistent checkpointing. In transaction consistent checkpoints for all transactions all actions of the transaction are either completely or not at all included. In non-consistent checkpoints actions and transactions can be partially included. Because read actions don't modify the data, we can mostly ignore them when considering checkpoints. The checkpointing process is typically a special thread process that periodically performs the checkpointing of the database. There are different ways of triggering the beginning of the checkpoint, e.g. it can start whenever the transaction log has accumulated a predetermined amount of records since the previous checkpoint. The term backup is often used as a synonym for the checkpointing of especially main-memory databases.
  • Referring to FIGS. 2 a-2 c there is depicted a common database structure for modifying and checkpointing data in the relational MMDBMS according to the prior art. As shown in FIG. 2 a the primary storage contains a page A 101 comprising a page header 102 and data objects 103, e.g. in this case DO1, DO2 and DO3. The page A may contain a plurality of data objects but in this example a set of three data objects is used for simplicity. The page A may not actually be a physical contiguous area of the main-memory but it is in a form of a logical page which is a linked list of data objects floating around the main-memory, When the checkpointing process begins, this means in the storage level that in the beginning a number of pages are included in the current checkpoint but they are not yet written to the secondary storage. The writing of the pages of the checkpoint is a time consuming process during which, there may be transactions that need to modify the data of the pages of the check-point, for example updating one or multiple data objects on the page A. The modification of data objects of the page A in transaction level is omitted from FIGS. 2 a-2 c for simplicity.
  • FIG. 2 b shows a situation in the storage level the first step of a typical checkpointing method for a main-memory database. When the checkpointing process starts processing the page A the page is copied in the primary storage so that the page A is presented as a physical page 105 forming a physical contiguous area of the main-memory in primary storage 10. The page A 105 comprises data objects DO1, DO2 and DO3 arranged contiguously in a sequential order. Subsequently, the checkpointing process writes the page A to the secondary storage 16. As shown in FIG. 2 c the page A 101 is finally written as a physical page A 109 to the memory space 107 of the disk file, where the page A 109 contains rows and each row contains one data object DO1, DO2 and DO3. When the page A 101 is written as the page A 109 to the secondary storage, it means that the page A 109 is a back-up copy of the page A 101. In the simplest checkpointing methods, while checkpointing is active and the page has not yet been written to the secondary storage, if there is a transactional request for data object modification on the page, for example updating a data object 103 on the page A, the transactional modification is quiesced until the checkpoint has completed writing the page(s) that the transaction needs to modify. After the checkpointing process has moved to process another page in the primary storage, the page A 101 can be modified, e.g. by a transactional update, in the primary storage.
  • To ensure the consistent checkpointing of the page 101, the modification of the page A is cancelled during the checkpointing and the modification has to wait until the checkpointing of the page A is completed. The checkpointing is not consistent if the page A is written (terms copied or dumped area also used) to the disk while transactions are allowed to modify any data on the page A during the checkpointing. In this case, the checkpointing may be partially consistent, e.g. action consistent, but transaction consistent checkpointing provides all actions of the transaction to be consistent. Otherwise the checkpointing as a whole is considered non-consistent. Consequently, if a consistent checkpointing is a requirement, then during the consistent checkpointing the data to be modified is locked in the main memory (primary storage) for writing to the disk (secondary storage). Thus, transactions are not able to perform write operations without waiting for the disk access which slows down is database operations and a constraint for real-time operation is not met.
  • Referring now to FIGS. 3 a-3 d there is depicted another way of the prior art to make a consistent checkpointing while modifying data during checkpointing the relational MMDBMS. As shown in FIG. 3 a the primary storage contains a page B 101 comprising a page header 102 and a number of data objects 103, e.g. in this case DO4, DO5 and DO6. The page B is in a form of a logical page which is a list of data objects DO4, DO5, DO6 floating around the main-memory. When the checkpointing of the database begins, this means in the storage level that the page B 101 is included in the current checkpoint but it is not yet written to the secondary storage. Meanwhile there is a transactional request for page modification, for example updating the page B or a data object 103 on the page B, in the transaction level.
  • FIG. 3 a also shows a situation in the storage level, when the first transactional modification to the page B occurs. The page B 101 is copied in the primary storage to a page B′ 101 a. The page B 101 comprises data objects DO4, DO5 and DO6 that need to be written to the secondary storage in the checkpoint. Meanwhile the transactional request for page modification, for example adding or removing a data object 103 on the page B′ 101 a, is accepted and consequently, the transactional modification of the page B is allowable during the checkpointing. When the first transactional modification to the page B during checkpointing occurs, the current page B is copied to the main memory (primary storage) as a page B′ 101 a which is initially an identical copy to the page B. Now the page B′ comprising data objects DO4, DO5, DO6 may be altered by transactional operations such as add or remove a data object. Lets presume that in the meanwhile the transactional request for page modification, for example updating the data object DO4 on the page B′ to be replaced by a new data object DO4′ is allowed. After the copy of the page B, as the page B′, is ready in the primary storage, the transactional modification is performed to page B′ 101 a, i.e. the data object DO4 will be replaced by the new data object DO4′ in this exemplary case. Now the page B′ first comprises data objects DO4, DO4′, DO5, DO6 as shown in a dash-lined box of page B′ 101 a in FIG. 3 a. After the transactional modification is committed at the transaction level during the current check-pointing, the data object DO4 is replaced by the new data object DO4′ and the data object DO4 is removed in this exemplary case and finally the page B′ 101 a comprises data objects DO4′, DO5, DO6 as shown in a block of page B′ 101 b in FIG. 3 a. This means that there are in the main memory (primary storage) both the copy of the page B 101 and page B′ 101 b at the same time. As shown in FIG. 3 a now the page B′ 101 b comprises data objects DO4′, DO5, DO6 and the page B 101 data objects DO4, DO5, DO6. As consequence of this main memory resources are spent for both these page copies for a period of time until the checkpointing process has written the page B 101 to the secondary storage.
  • When the page B 101 is being checkpointed, the checkpointing process writes the page B 101 to the secondary storage 16. As shown in FIG. 3 c the original page B 101 is written as a physical page B 109 to the memory space 107 of the disk file, where the page B 109 resides containing data objects DO4, DO5 and DO6, i.e. it contains data of the original page B. When the page B 101 is written as the page B 109 to the secondary storage, it means that the page B 109 is a back-up copy of the page B 101 of the primary storage. In this case, when the checkpointing process moves to checkpoint another page in the primary storage, the page B′ 101 a, 101 b is already or it can be modified, e.g. by a transactional update, in the primary storage. In the transaction level the transactions are free to perform whatever update operations, e.g. insert, update and/or delete, to the page B′ that is a copy of the page B. An optional transaction log 18 as shown in FIG. 3 d lists information on all transactional modification that have been committed during the database processing.
  • As a conclusion, according to the prior art the consistent checkpointing of the page 101, while a request for modification of the page occurs during the checkpointing, is guaranteed by using those two methods described above. The first method for ensuring the consistent checkpointing is depicted in FIGS. 2 a-2 c, where the modification of the page A is deferred during the checkpointing and the modification has to wait until the checkpointing is completed. The second method for ensuring the consistent checkpointing is depicted in FIGS. 3 a-3 d, where the request for modification of the page B involves the page B to be copied to the main memory (primary storage) as a page B′ which is initially an identical copy to the page B. After the copy of the page B, as the page B′, is ready in the primary storage, the transactional modification is performed to page B′.
  • FIGS. 4 a-4 d show a way of the prior art to make a so-called non-consistent checkpointing while modifying data during checkpointing the relational MMDBMS. As shown in FIG. 4 a the primary storage contains a page C 101 comprising a page header 102 and a number of data objects 103, e.g. in this case DO7 and DO8 in a form of a logical page as described earlier. When the checkpointing of the database begins, this means in the storage level that the page C is included in the list of pages to be checkpointed but it is not yet written to the secondary storage. Meanwhile there is a transactional request for page modification, for example up-dating a data object 103 on the page C. The request is accepted and the transactional modification of the page C is allowable during the checkpointing. Lets presume that the transactional request for page modification, for example updating the data object DO7 on the page C to be replaced by a new data object DO7′ is allowed. When the page C is copied in the primary storage, the transactional modification is performed to the page C 101, i.e. the data object DO7 will be replaced by the new data object DO7′ and in pursuance of replacing the data object DO7 by DO7′ it is also removed from the page C. There is no guarantee that the transactional modification is also committed at the transaction level. Now the page C 101 comprises data objects DO7′, DO8 as shown in a block of page C 101 b in FIG. 4 a. FIG. 4 b shows a situation in the storage level, when the first transactional modification to the page C occurs and the physical page C 105 as described earlier comprises now data objects DO7′ and DO5. When the checkpointing process writes the page C 105 to the secondary storage 16, the backup copy of the page C 109 is not consistent with the original page C 101. If the database needs to be recovered from the checkpoint, the inconsistent pages of the database must be “repaired” with information about transactions that occurred during the checkpoint. An exemplary transaction log 18 as shown in FIG. 4 d lists information on all transactional modification during the checkpointing to the secondary storage. Each row 118 of the transaction log contains following information concerning one transaction: a link to page C, an old version of the data object modified and a new version of the data object modified. This kind of transaction log of prior art is a physical undo-redo log, by means of which the database must be processed to be able to recover to the latest checkpoint.
  • There are several disadvantages in the methods for making a consistent checkpointing of a relational MMDBMS described above. One of the main requirements for the MMDBMSs, as well as for any DBMSs, is that the data must be accessible and mutable with atomary, consistent, isolated and durable (ACID) transactions. For the transactions to meet real-time constraints, they must be able to perform read and write operations without waiting for a disk access. Even if the data is in the buffer cache, it is not necessarily mutable immediately, if the data is locked for writing to the disk as part of the DBMS persistency mechanism. The aforesaid method of the prior art does not fulfil these requirements, because ensuring the consistent checkpointing of the page the modification of the page is stopped during the checkpointing and it has to wait until the checkpointing is completed. The problem is that at the transactional level the modification operations are blocked during propagating the checkpointing at the storage level and consequently the real-time response for all database operations, especially write operations, is not guaranteed. This causes considerable delays to transaction level processing.
  • Other disadvantage is a main memory usage overhead caused by copying of pages during the checkpointing. The volatile RAM memory usage, on top of the user data, should be kept to a bare minimum compared to the disk space which is usually available in large quantities. The aforesaid method of the prior art copies the current page to the main memory (primary storage) as an identical copy to the page, when a transactional modification to the page B occurs during the checkpointing. Both the copy of the page and the original page is retained in the main memory until the checkpoint has been completed and as consequence of this main memory resources are spent for this extra page. Because each page to be checkpointed is copied upon the first write to the page, it is possible to double the memory consumption during the checkpointing. Furthermore, copying the whole page upon first write upon it causes all the data on the page, not only that which is written, to be copied, causing extraneous CPU usage.
  • Still another disadvantage in prior art checkpointing is the need to use a transaction log for recover the database. The traditional approach to the persistency in DBMSs is checkpointing and transaction logging. The checkpointing of prior art is tightly coupled to the transaction logging. The transaction log, in particularly a physical undo-redo log, which is written to the secondary storage, must be processed to be able to recover from the latest checkpoint. The requirement of always using transaction logging to ensure database consistency is not always acceptable from the applications point of view primarily because transaction logging causes significant performance degradation of write transactions because all transactions must be successfully written to the disk upon transaction commit.
  • The problems set forth above are overcome by providing a consistent checkpointing of a main-memory storage, preferably a main-memory database, without disturbing the transaction level processing.
  • SUMMARY OF THE INVENTION
  • It is an object of the invention to provide a method for making a consistent checkpoint of a main-memory storage, wherein data modification is allowed during the checkpointing without slowing down a transaction level processing. Also an object of the invention is to provide savings in main-memory usage. It is another object of the invention to provide a programmable software product thereto.
  • The object of the invention is achieved by providing a method for making a consistent checkpoint of a main-memory storage, wherein a data object to be modified on the page comprising at least one data object is copied in the main-memory during the checkpointing, instead of the whole page to be copied. Another object of the invention is achieved by providing a programmable software product thereto.
  • In accordance with a first aspect of the invention there is provided a method for making a consistent checkpoint of at least one page in a computer system having at least one primary and at least one secondary storage, said primary storage having at least one page which comprises at least one data object on said page, the computer system allowing at least one write operation to modify at least one data object of the page, and said page being written into the secondary storage during the checkpointing, wherein the method comprises steps of:
      • beginning the process of checkpointing,
      • including at least one page in the primary storage into a group of pages to be checkpointed,
      • altering at least one data object of the page with at least one data write operation during checkpointing before the page has been checkpointed,
      • marling said at least one data object resulting from said at least one data write operation as a pending data object,
      • writing at least one of the data objects of the page into the secondary storage, and
      • altering the state of said pending data objects.
  • In a one preferred embodiment of the invention a method comprises a step of altering at least one data object of said page is a pending operation of addition of the data object to the page.
  • Preferably, a data object is modified by a transactional database operation during the checkpointing.
  • In another preferred embodiment of the invention a method comprises a step of altering at least one data object of said page is a pending operation of removal of the data object from the page.
  • Preferably, a data object with a pending add operation is directly removed or modified by a remove or a commit operation.
  • In still another preferred embodiment of the invention a method comprises a step wherein the removed data object along with information related to the pending operation is moved from the page to a separate pending removals page in the primary storage.
  • In accordance with a second aspect of the invention there is provided a programmable software product for making a consistent checkpoint of at least one page comprising at least one data object in a computer system arranged To have at least one primary and at least one secondary storage, said primary storage arranged to have at least one page which comprises at least one data object on the said page, the computer system allowing at least one write operation to modify at least one data object of the page, and said page being written into said secondary storage during the checkpointing, wherein:
      • the process of checkpointing is arranged to begin,
      • at least one page in the primary storage is arranged to be included into a group of pages to be checkpointed,
      • at least one data object of said page is arranged to be altered with at least one data write operation during checkpointing before the page has been checkpointed,
      • said at least one data object resulting from said at least one data write operation is arranged to be marked as a pending data object,
      • at least one of the data objects of said page is arranged to be written into the secondary storage, and
      • the state of said at least one pending data object is arranged to be altered.
  • In accordance with a third aspect of the invention there is provided a method for recovering at least one page comprising at least one data object from a consistent checkpoint in a computer system having at least one primary and at least one secondary storage, said secondary storage having at least one first page which comprises at least one data object and said secondary storage having at least one second page which comprises at least one data object having pending operation status of removal of the data object and information about the original location of the data object, wherein the method comprises steps of:
      • reading at least one data object from said first page in the secondary storage and writing said data object to the primary storage, and
      • reading at least one data object from said second page in the secondary storage and adding said data object to its original location in the the primary storage.
  • The benefits of the embodied invention are as follows. It provides a solution in which all data is readily available for transactions to both read and write operations during the consistent checkpointing, while offering high performance, guaranteed real-tine response and acceptable memory usage overhead. It also provides a solution in which the checkpointing and transaction logging are fully decoupled meaning that it is possible to run the DBMS without logging at all, and still be able to recover from the latest checkpoint. Furthermore, even if transaction logging is enabled, it is possible to recover the database to the state of the most recent successful checkpoint without processing the log at all. In this case, all the transaction log before the beginning of the checkpoint should be discardable which saves the space consumption of the disk i.e. the secondary storage. The DBMS also allows arbitrarily long and complex transactions with possible user interaction.
  • These features are most beneficial in embodiments designed for telecommunications and embedded use.
  • Other objects and features of the present invention will become apparent from the following detailed description considered in conjunction with the accompanying drawings. It is to be understood, however, that the drawings are designed solely for purposes of illustration and not as a definition of the limits of the invention, for which reference should be made to the appended claims. It should be further understood that the drawings are not necessarily drawn to scale and that, unless otherwise indicated, they are merely intended to conceptually illustrate the structures and procedures described herein.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • An embodiment of the invention will be described in detail below, by way of example only, with reference to the accompanying drawings, of which
  • FIG. 1 a depicts a common relational DBMS arrangement for storage level and transaction level processing according to prior art.
  • FIG. 1 b depicts a common relational DBMS arrangement for storage level and transaction level processing according to the invention.
  • FIGS. 2 a-2 c depicts a block diagram of making a consistent checkpoint of the database according to prior art.
  • FIGS. 3 a-3 d depicts another block diagram of making a consistent checkpoint of the database according to prior art FIGS. 4 a-4 d depicts a block diagram of making a non-consistent checkpoint of the database according to prior art FIGS. 5 a-5 d depicts a block diagram of making a consistent checkpoint of the database according to an embodiment of the invention.
  • FIG. 6 depicts a basic structure of data at the storage level according to the invention.
  • FIGS. 7 a-7 e depicts a block diagram of a performance of the pending operations on the page in the primary storage according to the invention.
  • FIGS. 8 a-8 d depicts a block diagram of making a consistent checkpoint of the database according to another embodiment of the invention.
  • FIGS. 9 a-9 b depicts a block diagram of recovering a primary data storage from the secondary data storage according to another embodiment of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Descriptions of FIGS. 1 a, 2 a-2 c, 3 a-3 d and 4 a-4 d were given earlier in connection with the description of the state of art.
  • As an exemplary embodiment of a computer system according to the invention there is depicted in FIG. 1 b a relational database management system (DBMS) arrangement, A relational DBMS arrangement according to the invention has a data-base server 12 comprising the primary storage 10 and database file unit 16 being the secondary storage. At the transactional level the general database processing is similar to as described in accordance with FIG. 1 a. At the storage level the primary storage 10 is formed of pages, typically arranged into a doubly linked list. In the main-memory 10 the page is in a form of a logical page which is a list of data objects floating around the main-memory. A memory location 15 is allocated in the main-memory for a disk page which represents a page on the disk. The page is presented as a physical page 10 a forming a physical contiguous area of the main-memory. In the main-memory the disk page 105 a has two things, firstly it is a buffer 115 for the page image on the disk and secondly a location of the disk page on the disk. The physical page 105 a is allocated for the disk page as the disk page is created. The data objects are copied into the buffer 115 of the disk page, the buffer is written to the disk (secondary storage) and released after writing. This is the only time the pages exist in their physical representation in the main-memory (primary storage). To make checkpointing more efficient a cyclic buffer 115 for the disk page 105 a is used. A transaction log 18 is depicted as an option. Connections a, b and c are descripted in pursuance of FIG. 1 a.
  • In the checkpoint only the pages that have been modified since the previous checkpoint need to be backed up. Each page contains a “dirty flag”, which is set whenever the page is modified, and cleared when the checkpointing process writes the page to the disk. The pages to be backed up are those that are dirty when the checkpoint begins; any page that becomes dirty while the checkpointing is already on its way must not be backed up if a consistent checkpoint is desired While a new checkpoint is underway, the old checkpoint must remain valid until the new checkpoint is finished successfully. To accomplish this, the dirty pages are written to new locations on the disk and their old versions from the previous checkpoint remain valid to keep the old checkpoint consistent. When the new checkpoint is completed, any old versions of the pages written in the new checkpoint become obsolete, and are marked as free on the disk. The pages from the old checkpoint that have not been modified, and thus were not written again by the new checkpoint, remain valid from the old checkpoint.
  • At the storage level there are three normal database operations for transactions. The “add data object” adds a new data object to the storage. The new data object may be a completely new data object, a new version for an existing data object, or a delete mark for an existing data object. The data objects are added as tentative, i.e. not transaction committed, data objects. The “remove data object” removes an existing data object, and the “commit data object” marks a data object as committed, i.e. non-tentative. “Update” and “delete” statements create new versions of the previously existing data objects, whereas “insert” statement creates completely new data objects. If more than one version of a certain data object is made within a transaction, e.g. a row is updated twice, the latest successfully statement committed version of each data object will be transaction committed If the transaction committed version is a delete mark, the data object is removed from the database.
  • According to the invention new versions of data objects are made by creating a new, altered copy of the previous version of the data object. Consequently, transaction and statement aborts are easy, just by forgetting the new versions and reverting the previous ones. The old versions of data objects must be readily available because other transactions must not see the data written to the database by another concurrently active transaction. A delete mark is a special data object. When the delete mark is transaction committed, the old transaction committed version and the delete mark cancel each other out. It is necessary to represent as a data object with enough information to locate the corresponding actual data object, because we need to find which data object is meant to delete in recovery. Old versions are only removed at transaction commit or abort. In commit, any old transaction committed versions replaced or deleted (replaced by the delete mark) by this transaction, and any intermediate versions created by this transaction but that didn't become transaction committed, are removed. In abort, only the versions created by the traction are removed and old versions from previous transactions remain as they are. When the checkpointing is not active, the operations are very straightforward, namely all changes to the storage are performed directly.
  • Next, the invention is described pursuant to an exemplary embodiment.
  • Referring to FIGS. 5 a-5 d there is depicted a database structure according to an embodiment of the invention to make a consistent checkpointing while modifying data during checkpointing the relational MMDBMS. As shown in FIG. 5 a leftward, the primary storage contains a page D 101 comprising a page header 102 and a set of data objects 103, e.g. in this case DO9, DO10 and DO11. This is a situation at the beginning of the checkpointing process. The page D 101 contains some changes since the previous checkpoint and is therefore marked as a ‘dirty page’ that needs to be checkpointed. The page D is in a form of a logical page which is a list of data objects DO9, DO10, DO11 floating around the main-memory. When the checkpointing of the database begins, the page D is included in the current checkpoint but it is not yet written to the secondary storage. In other words, the pages to be backed up during this current checkpoint are “frozen” in the beginning of the checkpointing. The freezing step is atomic with respect to any actions on the primary storage, and any transaction commit or abort.
  • Meanwhile there is a transactional request for page modification, for example updating the page D or a data object 103 on the page D, in the transaction level. To retain the consistency of the checkpointing, the frozen pages cannot be altered with regular transactional operations during the current checkpointing. This problem is overcome according to the invention by presenting “pending operations”. Pending operation is an addition or removal of a data object so that the data object becomes visible to the transactions accessing the database but the concurrently ongoing checkpointing process takes special action on these data objects such as excluding the pending data from the data to be checkpointed.
  • After the previous checkpoint the disk space 107 of the secondary storage 16 contains the data objects from this checkpoint. Meanwhile the transactional request for page modification, for example updating a data object 103 on the page D, is accepted and consequently, the transactional modification of the page D is allowable during the checkpointing.
  • Lets presume that in the meanwhile the transactional request for page modification, for example updating the data object DO9 on the page D to be replaced by a new data object DO9′ is allowed. Updating a data object at database page level is a combination of add and remove operations. Now according to the invention the added data object, i.e. the data object DO9′ is supplemented with the pending add (PA) status information. The information about the new pending operation may also be added to a list of pending operations (not shown) And the current version version of the data object to be updated, i.e. the data object DO9 is marked with pending remove (PR) data object from the list of pending operations (not shown). The pending add operation may be also called the pending insert operation, and the pending remove operation may be called the pending delete operation meaning the same thing respectively.
  • When the transactional modification to the page D occurs, the new data object DO9′ is added to the page and marked with the pending add (PA) state information. The state information may for example be a flag in the data object itself and/or an entry in a list of pending operations. Because this example is about updating the data object DO9 with a new value (DO9′), the original DO9 data object is marked with pending remove information. When the checkpointing process starts writing the page D to the buffer location 105 a in the disk buffer memory area 115, the checkpointing process includes only those data objects from the page that do not have a pending add operation information attached to them. Upon completing writing the page D 101 a to the buffer 105 a and further to the secondary storage 16, the checkpointing process finalises the pending operations of the page D 101 a by removing the original DO9 and permanently adding the DO9′ to the list of data objects on the page D. The pending status of the added data object DO9′ is removed as well.
  • As shown in FIG. 5 c a physical page D 109 in the secondary storage 16 resides in the memory space 107 of the disk file. The data of the disk page D 109 is identical to the content of the buffer 105 a. Hence, it contains data objects DO9, DO10 and DO11, i.e. it is the consistent backup of the original page D 101 in the secondary storage.
  • Referring to FIG. 5 a again, after writing the data objects DO9, DO10 and DO11 to the current checkpoint in the secondary storage, the checkpointing process alters the pending operations to be actual data on the page D as described later on.
  • After the transactional modification is committed, as will be discussed later, at the traction level during the current checkpointing on the page D 101 a, the data object DO9 is replaced by the new data object DO9′ and the data object DO9 is removed in this exemplary case. As part of the pending operations a link between data objects DO9 and DO10 is broken up and a new link between data objects DO9 and DO9′ and DO9′ and DO10 is opened up. Without further write operations to the page, the data objects DO9, DO9′, DO10 and DO11 remain until the page is checkpointed. The extra memory resources are spent only for the data object 009′, not for the whole page. Finally, after the page D has been checkpointed, the pending operations can be made official, creating the page D 101 b comprising data objects DO9′, DO10, DO11 linked together as shown in FIG. 5 a.
  • An optional transaction log resides in the secondary storage which lists information on all transactional modifications that have been committed during the database processing. The transaction log contains information about the write operations such as add and remove a data object or commit a transaction. According to the present invention, the transaction logging is not coupled with the checkpointing process. Thus the method present here produces a consistent checkpoint also without transaction logs.
  • FIG. 5 d shows a situation of the page D 101 a if another transactional update on DO9′ is performed and while the page D is still frozen, the update is performed directly. DO9′ already has a pending add operation on it, and is thus excluded from the checkpoint, and thus further altering it does not interfere with the consistency of the checkpoint. Lets presume that a transaction requests an update of DO9′ to DO9″. The new data object DO9″ is added to page D as a pending operation. When the transaction commits, the old version DO9′ is directly removed, even if the page is frozen. Finally, after the page D has been checkpointed, the page D 101 b comprises data objects DO9″, DO10, DO11 linked together as shown in FIG. 5 d. The physical page produced by checkpointing the page D is depicted in FIG. 5 d is exactly the physical page depicted in FIG. 5 c. Similarly, if the DO9′ is removed or committed by a transaction, the removal or commit is performed directly without a pending operation and the physical page produced from page D remains the one shown in FIG. 5 c.
  • Referring now to FIG. 6 each page P 101 contains a page header 102 and a set of data objects DO 103 for example in a doubly linked list (lines e, f). The pages 101 are arranged into a doubly linked list (line j). The data objects 103 are pointed to through row objects R 151 from the index structure 1155, which is used for transactional access to the data objects. This is arranged by a doubly linked list (line h) between rows and data objects. The page of the data object is found from the row object of the data object through a link (line g). The row objects 151 are a special layer connecting the indexes and the data objects by links (line i), and the rows are part of the transaction processing mechanism. For each data object linked to the row, the row has also a pointer to the page (not shown) that contains the data object. Each row object presents a distinct value in the index. If more than one version of the data object exist they are all linked to the same row. According to the invention the indexes 155 and row objects 151 are not included into the checkpointing.
  • Next the pending operations are discussed relating to FIGS. 7 a-7 e. The pending operations are finalised in the primary storage on the page D 101 a after the page D has been written to the current checkpoint in the secondary storage as shown in FIG. 5 a As already mentioned according to the invention the new data object DO9′ is marked with the pending add (PA) operation and the current data object DO9 is marked with pending remove (PR) operation. While a transaction wants to make a new version of the current data object, at the storage level this is an add data object operation which is performed as a pending operation, because the page comprising this data object is frozen for checkpoint.
  • As shown in FIG. 7 a rows R9, R10 and R11 in a table have data objects: DO9, DO10 and DO11, respectively, residing on the frozen page D. This is the situation before the data object is modified. As described in accordance with FIG. 6 pages, rows and data objects are linked between each other in a way described therein. In this exemplary embodiment a transaction T wants to make a new version DO9′ of the current data object DO9. For the sake of compactness, the indexing level on top of the rows is left out from FIGS. 7 a-7 e concerning only the storage level.
  • FIG. 7 b shows the situation after the transaction T has modified the data object DO9, i.e. after updating DO9. The new data object DO9′ is added to its normal position in the data object list of page D, but it is marked as a pending add and the pending operation is added to the list of pending operations of the page D. Because of the pending add, the data object DO9′ is not yet considered as a “real” member of the page D, which means that DO9′ is not included in the list of data objects to be written to the secondary storage from the page D. This situation is depicted in FIG. 7 b.
  • FIG. 7 c shows the situation after the transaction is committed. Note that after the transaction T commits, the original version of the data object DO9, i.e. the previous current data object, is no longer accessible from row R9. As T commits, DO9′ is transaction committed, and DO9 is marked with the pending remove operation (PR). FIG. 7 d shows the situation after the pending add operation of FIG. 7 c has been made permanent and FIG. 7 e shows the situation after the pending remove operation of FIG. 7 d has been made permanent
  • Referring to FIGS. 8 a-8 d there is depicted a database structure according to another embodiment of the invention to make a consistent checkpoint while modifying data during the checkpointing of the relational MMDBMS. As shown in FIG. 8 a leftward, the primary storage contains in this exemplary case a page E 101 comprising a page header 102 and a set of data objects 103, e.g. in this case DO12, DO13 and DO14 floating around the main-memory in a form of a logical page. When a checkpointing process begins, the page E is included in the list of pages belonging to the current checkpoint but it is not yet written to the secondary storage, i.e. it is “frozen” in the beginning of the checkpointing. Meanwhile there is a transactional request for page modification, for example updating a data object 103 on the page E, in the transaction level. To retain the consistency of the checkpointing the pending operations are used according to the invention as described earlier. With pending operations, data objects may be added or removed during the checkpoint. The data objects with a pending remove are referred to as pending remove data objects or simply pending removes in the following.
  • Lets presume that in the meanwhile the transactional request for page modification, for example updating the data object DO12 on the page E 101 a to be replaced by a new data object DO 12′ is allowed. Now according to the invention the new version of the data object to be modified on the page E 101 a, i.e. the data object DO12′ is marked with the pending add (PA) information. And the current version version of the data object to be modified, i.e. the data object DO12 is marked with pending remove (PR) information, becoming a pending remove data object.
  • According to this embodiment, when the transactional modification to the page E 101 a occurs, the data object DO12 which is marked with the pending remove (PR) operation is removed (detached) from the page E 101 a and moved to another page G 201 in the primary storage. The page G 201 is called a pending removes page which is a special page for pending remove data objects from different pages. The moved data object DO12 is linked to information comprising the page or table identity of the page E 101 a from which it was detached. The page G 201 also flushes to the secondary storage at times, when it becomes filled with pending remove data objects. Other possible pending remove data objects 203, e.g. DOX, DOXX etc., linked to their table or page information 205 are shown in FIG. 5 a. The information of the table or page identity 205 associated with the respective data object 203 are copied to the buffer of disk page G 105 b as shown in FIG. 8 b, which disk page G is a physical page G 105 b in the main-memory. Each pending remove data object with its table information 203, 205 is copied on the physical page G 105 b separately and in sequential order in the same way as data objects marked with the pending operations are represented in the primary storage as described earlier in association with FIG. 5 b. In this exemplary case the information 203, 205 is presented in the form: {page_id, DO12} in the buffer location 119 b in the physical page G 105 b.
  • When the page G 201 becomes full the physical page G 105 b is written to the secondary storage in a separate memory location 109 b than the backup copy of the page E 109 as shown in FIG. 1 d. At the same time memory space is respectively released in the main-memory.
  • In addition to flushing the pending removes page, the pending remove data objects can be written to the secondary storage by copying them from the pending removes page to any empty space of a regular physical database page created during checkpointing, and releasing them from the pending removes page in the primary storage after copying.
  • As shown in FIG. 8 b in the beginning the data object DO12 is not copied to the buffer location 105 a when the page E is checkpointed, because DO12 is marked with the pending remove (PR) information. The physical page E 105 a hence contain the data objects DO13 and DO14 which will be unchanged during the checkpointing. Then because the data object DO12 is marked with the pending remove (PR), DO12 is removed (detached) from the page E 101 a and moved to another page G 201 in the primary storage according to this embodiment of the invention. Subsequently, the checkpointing process writes the buffer location 105 a to page E 109 in the secondary storage 16 as shown in FIG. 5 c and releases the buffer E 105 a thereafter. The physical page E 109 resides in the memory space 107 of the disk file. Once the page G 201 containing pending removes in the primary storage fills up, the checkpointing process may make a copy of it to the buffer 105 b and write the content of the buffer to the page on disk 109 b and release the buffer 105 b and page G 201 for subsequent pending removes.
  • After the data object DO12 is removed (detached) during the current checkpointing from the page E 101 a, the data object DO12 is replaced by the new data object DO12′ in this exemplary case as shown in FIG. 5 a. As a consequence of removing DO12 also a link between data objects DO12 and DO13 is broken up on the page E 101 a Then simply during the pending add (PA) operation directed on DO 12′ a new link between data objects DO12′ and DO13 is opened up. Finally the page E comprises data objects DO12′, DO13 and DO14, in the same way as shown in relation to page D 101 b in FIG. 5 a. This modified version is the only copy of the previous original page E 101 in the main-memory (primary storage). As consequence of this main memory resources are spent only for the data objects currently accessible by the transaction management system, i.e., the live data in the database.
  • According to this embodiment of the invention the consistent checkpointing is guaranteed, because the necessary information to bring the pages back to the consistent state resides in the checkpoint itself, stored in the secondary storage. By means of reading the information on the page E 109 and the page G 109 b from the secondary storage the database is recovered and the consistent checkpointing is guaranteed. In this exemplary case, the necessary information is the row 119 b from the page G 109 b and the data objects DO13 and DO14 from the page E 109 as shown in FIGS. 8 c and 8 d.
  • Referring to FIGS. 9 a-9 b there is depicted a method for recovering the main-memory database in primary storage from a checkpoint that has been stored in the secondary storage according to an embodiment depicted in FIGS. 8 a-8 d. Let's presume that after the checkpointing process the physical (disk) pages E and F 109, as well as G 109 b, reside in the memory space 107 of the secondary storage in separate memory locations according to FIG. 9 a. In this example, the page E 109 contains data objects DO13 and DO14 (see also FIG. 5 c) and the page F 109 contains DO15, DO16 and DO17. When the main-memory database is recovered, the data-base pages E, F 109 are read from the secondary storage and corresponding pages E, F 101 are created in the primary storage. However, as described in the embodiment depicted in FIGS. 8 a-8 d, some data objects of the pages E and F 101 may have stored in the secondary storage on a separate page G 109 b that contains data objects having pending remove status. When recovering the database, the pending remove operations must be undone. According to the invention, the information needed for the pending remove undo operation is stored in the pending removes page G 109 b (see also FIG. 8 d). The page G 109 b contains information of the pending remove (PR) data objects, e.g. information of the page identity associated with the respective data object This information is presented in the form: {page_id, DO12} in the buffer location 119 b in the physical page G 109 b. This information contains the data object and information about the page to which the data object must be restored. In this example, the page G 109 b contains information: table_id relating to the page E and DO12, table_id relating to the page F and DO18. Upon recovery, the database management system reads the contents of the pending removes page G 109 b and puts the data objects DO12 and DO18 from the read page back to the original pages E and F 101 of the data objects, as shown in FIG. 9 b. Consequently, after recovering process in the primary storage the page E contains again data objects DO12, DO13, DO14 and the page F data objects DO15, DO16, DO17, DO18.
  • According to the invention only the data object to be modified during the checkpointing is copied in the main-memory (primary storage), instead of the whole current page to be copied to the main memory as an identical copy of the page. The data objects of the original page D that remain unchanged during the current checkpointing and thus are not marked with pending operations are not copied in the primary storage according to the invention.
  • This embodiment of the invention is very resource effiecient because there is no need to consume more than one page worth of memory space for pending remove operations. The pending remove data objects are detached from the original page and moved to a special pending remove page which is not a regular page of the database, but a special storage for pending removes. There is only a need to retain one page's worth of pending remove data objects, as earlier described, which consumes much less memory space than retaining a copy of all the pending remove data objects.
  • When making the pending operations permanent on the page following general notes is considered. The pending add requires no immediate processing, only the pending operation is removed. The data object is already in its right place on the page. The pending remove causes the data object to be removed. This also reduces the amount of space used by the data objects on the page. The pending commit causes the data object to be flagged as committed. This affects the amount of space taken by the data object, because the statement and transaction identities for this data object are no longer needed.
  • As an exemplary embodiment of a programmable software product for making a consistent checkpoint of a relational main-memory database in a database management system according to one embodiment of the invention is presented in the following in a form of exemplary software code listings.
  • A function Simple_Add performs adding of a tuple to a non-frozen page. It can be called directly when checkpointing is not underway, but is normally called from the Add function. All changes to the storage are performed directly by the Simple_Add function shown below.
    Simple_Add (page, prev_tuple, new_tuple)
    if prev_tuple == NIL then
    page = create_page ( )
    page.add_first (new_tuple)
    else
    page.add_after (prev_tuple, new_tuple)
    if page.need_split ( ) then
    page1, page2 = page.split (50%)
    page1.dirty = TRUE
    page2.dirty = TRUE
    page.dirty = TRUE
  • A function Simple_Remove performs removing of a tuple from a non-frozen page. It can be called directly when checkpointing is not underway, but is normally called from the Remove function. All changes to the storage are performed directly by the Simple_Remove function shown below.
    Simple_Remove (page, tuple)
    page.remove (tuple)
    free tuple
    if page.should_join_with (page.predecessor) then
    page.join_with (page.predecessor)
    elseif page.should_join_with (page.successor) then
    page.join_with (page.successor)
  • Add is a generic purpose function of adding a new tuple to a given page. The location of the tuple on the page is indicated by the prev_tuple argument, the new tuple is added after the prev_tuple. The page can be frozen or non-frozen. The Add function is shown below.
    Add (page, prev_tuple, new_tuple)
    if page == NIL or NOT page.frozen then
    Simple_Add (page, prey_tuple, new_tuple)
    else
    pending_add = create_pending_add ( )
    pending_add.tuple = new_tuple
    tuple.pending_op = pending_add
    page.add_pending_op (pending_add)
    page.add_after (prev_tuple, new_tuple)
  • Remove is a generic purpose function for removing an existing tuple from a given page. The page can be frozen or non-frozen. The Remove function is shown below.
    Remove (page, tuple)
    if NOT page.frozen then
    Simple_Remove(page, tuple)
    else
    old_pending_op = tuple.pending_op
    if old_pending_op is a pending add then
    page.remove_pending (old_pending_op)
    page.remove (tuple)
    free tuple
    else
    pending_remove = create_pending_remove ( )
    pending_remove.tuple = tuple
    tuple.pending_op = pending_remove
    page.add_pending (pending_remove)
  • Make_Checkpoint is a function for making a checkpoint of the database. The checkpoint is typically performed by a checkpoint thread, which calls this function, The Make_checkpoint function is described as follows.
    Make_Checkpoint ( )
    for page in all database pages do
    if page.dirty then
    page.frozen = TRUE
    for page in all frozen pages do
    disk_page = create_disk_page ( )
    disk_page.copy_to (page.header)
    for tuple in page.tuples do
    pending_op = tuple.pending_op
    if pending_op == NIL
     or pending_op is not a pending add then
    disk_page.copy_to (tuple)
    for pending_op in page.pending_ops do
    tuple = pending_op.tuple
    switch type of pending_op
    case add:
    # nothing needs to be done
    case remove:
    page.remove (tuple)
    free pending_op
    if there were any pending operations then
    page.dirty = TRUE
    if page.should_join_with (page.predecessor) then
    page.join_with (page.predecessor)
    elseif page.should_join_with (page.successor)
    then
    page.join_with (page.successor)
    else
    while page.need_split ( ) do
    page2, page = page.split (75%)
    page2.dirty = TRUE
    else
    page.dirty = FALSE
    page.frozen = FALSE
    disk_page.write_to_disk ( )
  • Here, the lines 1 to 3 begin a checkpoint by freezing all the currently dirty pages. Lines 4 to 11 produce a physical page for disk writing. A new disk page is allocated, and for all tuples that do not have a pending add the tuple is copied to the disk page. Lines 12 to 19 make any pending operations on the page permanent. Lines 20 to 33 reset the page dirty and frozen statuses and perform any page splits or joins that are required after making the pending operations permanent. If there were any pending operations on the page the page is set dirty otherwise it is clean. All pages are unfrozen. Line 34 writes the just produced physical page to the disk. Lines 4 to 34 are performed to each frozen page in the database, after which the checkpoint is complete.
  • Thus, while there have shown and described and pointed out fundamental novel features of the invention as applied to a preferred embodiment thereof, it will be understood that various omissions and substitutions and changes in the form and details of the devices illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Moreover, it should be recognized that structures and/or elements and/or method steps shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. It is intention, therefore, to be limited only as indicated by scope of the claims appended hereto.

Claims (52)

1. A method for making a consistent checkpoint of at least one page comprising at least one data object in a computer system having at least one primary and at least one secondary storage, said primary storage having at least one page which comprises at least one data object on the said page, the computer system allowing at least one write operation to modify at least one data object of the page, and said page being written into said secondary storage during the checkpointing, wherein the method comprises steps of:
beginning the process of checkpointing,
including at least one page in the primary storage into a group of pages to be checkpointed,
altering at least one data object of said page with at least one data write operation during checkpointing before the page has been checkpointed,
marking said at least one data object resulting from said at least one data write operation as a pending data object,
writing at least one of the data objects of said page into the secondary storage, and
altering the said at least one pending data object.
2. A method according to claim 1 wherein altering the data object of said page is a pending operation of an addition of a data object to the page.
3. A method according to claim 2 wherein the pending data object is visible to transactions accessing the page during the checkpointing process.
4. A method according to claim 2 wherein the pending data object is excluded from a list of data objects that are written to the secondary storage upon checkpoint
5. A method according to claim 2 wherein the pending data object is linked to at least one other data object that resides on the same page.
6. A method according to claim 2 wherein the pending data object is linked to at least one object through which the data object may be accessed.
7. A method according to claim 2 wherein the pending operation status of the pending data object is marked in the data object.
8. A method according to claim 2 wherein information related to the pending data object is added to a set of pending operations.
9. A method according to claim 2 wherein at least one further write operation to the pending data object is performed directly without producing an additional pending operation.
10. A method according to claim 1 wherein altering the data object of said page is a pending operation of a removal of a data object from said page.
11. A method according to claim 10 wherein the pending data object is not visible to transactions accessing the page during the checkpointing process.
12. A method according to claim 10 where the pending data object is included in the list of data objects that are written to the secondary storage upon checkpoint.
13. A method according to claim 10 wherein at least one link to the pending data object is removed from at least one other data object.
14. A method according to claim 10 wherein at least one link to the pending data object is removed from at least one object through which the data object may be accessed.
15. A method according to claim 10 wherein the pending operation status of the data object is marked in the data object.
16. A method according to claim 10 wherein information about the pending operation status of the removal of the data object is added to a set of pending operations.
17. A method according to claim 10 wherein the data object along with information related to the pending data object is moved from the page to a separate pending removals page in the primary storage.
18. A method according to claim 17 wherein the pending data object is excluded from the list of data objects written from the original page to the secondary storage upon checkpoint.
19. A method according to claim 17 wherein the data objects of the pending removals page are hidden from the transactions of the system.
20. A method according to claim 17 wherein at least one data object on the pending removals page is written to the secondary storage upon checkpoint.
21. A method according to claim 20 wherein said data object on the pending removals page is released in the primary storage after writing the data object to the secondary storage to release memory resources.
22. A method according to claim 1′ wherein altering the state of said pending data object is performed by altering information about the pending operation status in the data object.
23. A method according to claim 1 wherein the said altering of the state of said pending data objects is performed by adding or removing an object from a set of pending operations.
24. A method according to claim 1 wherein the primary storage is a main-memory database and the secondary storage is a disk file database in a relational database management system.
25. A programmable software product for making a consistent checkpoint of at least one page comprising at least one data object in a computer system arranged to have at least one primary and at least one secondary storage, said primary storage arranged to have at least one page which comprises at least one data object on the said page, the computer system allowing at least one write operation to modify at least one data object of the page, and said page being written into said secondary storage during the checkpointing, wherein:
the process of checkpointing is arranged to begin,
at least one page in the primary storage is arranged to be included into a group of pages to be checkpointed,
at least one data object of said page is arranged to be altered with at least one data write operation during checkpointing before the page has been checkpointed,
said at least one data object resulting from said at least one data write operation is arranged to be marked as a pending data object,
at least one of the data objects of said page is arranged to be written into the secondary storage, and
the state of said at least one pending data object is arranged to be altered.
26. A product according to claim 25 wherein the data object of said page is arranged to be altered to be a pending operation of an addition of a data object to the said page.
27. A product according to claim 26 wherein the pending data object is arranged to be visible to transactions accessing the page during the checkpointing process.
28. A product according to claim 26 wherein the pending data object is arranged to be excluded from a list of data objects that are written to the secondary storage upon checkpoint.
29. A product according to claim 26 wherein the pending data object is arranged to be linked to at least one other data object that resides on the same page.
30. A product according to claim 26 wherein the pending data object is arranged to be linked to at least one object through which the data object may be accessed.
31. A product according to claim 26 wherein the pending operation status of the pending data object is arranged to be marked in the data object.
32. A product according to claim 26 wherein information related to the pending data object is arranged to be added to a set of pending operations.
33. A product according to claim 25 wherein at least one further write operation to the pending data object is arranged to be performed directly without producing an additional pending operation.
34. A product according to claim 25 wherein the data object of said page is arranged to be altered to be a pending operation of a removal of a data object from said page.
35. A product according to claim 34 wherein the pending data object is arranged to be not visible to transactions accessing the page during the checkpointing process.
36. A product according to claim 34 wherein the pending data object is arranged to be included in the list of data objects that are written to the secondary storage upon checkpoint.
37. A product according to claim 34 wherein at least one link to the pending data object is arranged to be removed from at least one other data object.
38. A product according to claim 34 wherein at least one link to the pending data object is arranged to be removed from at least one object through which the data object may be accessed.
39. A product according to claim 34 wherein the pending operation status of the data object is arranged to be marked in the data object.
40. A product according to claim 34 wherein information about the pending operation status of the removal of the data object is arranged to be added to a set of pending operations.
41. A product according to claim 34 wherein the removed data object along with information related to the pending data object is arranged to be moved from the page to a separate pending removals page in the primary storage.
42. A product according to claim 41 wherein the pending data object is arranged to be excluded from the list of data objects written from the original page to the secondary storage upon checkpoint.
43. A product according to claim 41 wherein the data objects of the pending removals page are arranged to be hidden from the transactions of the system.
44. A product according to claim 41 wherein at least one data object on the pending removals page is arranged to hr written to the secondary storage upon checkpoint.
45. A product according to claim 44 wherein the memory resources of said data object on the pending removals page are arranged to be released in the primary storage after writing the data object to the secondary storage.
46. A product according to claim 25 wherein the altering the state of said pending data object is arranged to be performed by altering information about the pending operation status in the data object.
47. A product according to claim 25 wherein the altering the state of said pending data object is arranged to be performed by adding or removing an object from a set of pending operations.
48. A product according to claim 25 wherein the primary storage is arranged to be a main-memory database and the secondary storage is arranged to be a disk file database in a relational database management system.
49. A method for recovering at least one page comprising at least one data object from a consistent checkpoint in a computer system having at least one primary and at least one secondary storage, said secondary storage having at least one first page which comprises at least one data object and said secondary storage having at least one second page which comprises at least one data object having pending operation status of removal of the data object and information about the original location of the data object, wherein the method comprises steps of:
reading at least one data object from said first page in the secondary storage and writing said data object to the primary storage, and
reading at least one data object from said second page in the secondary storage and adding said data object to its original location in the the primary storage.
50. A method according to claim 49 wherein the method comprises steps of:
reading data of at least one checkpointed database page from the secondary storage to the primary storage,
forming at least one main-memory database page from said data,
reading data from a pending removals page, said data containing at least one data object and information about database page to which the said data object belongs to, and
adding the data object read from the pending removals page back to the database page.
51. A method according to claim 49, wherein the method comprises steps of:
reading data of at least one checkpointed database page from the secondary storage to the primary storage,
forming at least one main-memory database table from said data,
reading data from a pending removals page, said data containing at least one data object and information about database table to which the said data object belongs to, and
adding the data object read from the pending removals page back to the database table.
52. A method according to claim 49 wherein the primary storage is a main-memory database and the secondary storage is a disk file database in a relational database management system.
US10/851,214 2004-05-24 2004-05-24 Method for checkpointing a main-memory database Expired - Fee Related US7587429B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/851,214 US7587429B2 (en) 2004-05-24 2004-05-24 Method for checkpointing a main-memory database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/851,214 US7587429B2 (en) 2004-05-24 2004-05-24 Method for checkpointing a main-memory database

Publications (2)

Publication Number Publication Date
US20060004860A1 true US20060004860A1 (en) 2006-01-05
US7587429B2 US7587429B2 (en) 2009-09-08

Family

ID=35515314

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/851,214 Expired - Fee Related US7587429B2 (en) 2004-05-24 2004-05-24 Method for checkpointing a main-memory database

Country Status (1)

Country Link
US (1) US7587429B2 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060253502A1 (en) * 2005-05-06 2006-11-09 Microsoft Corporation Maintenance of link level consistency between database and file system
US20070043975A1 (en) * 2005-08-16 2007-02-22 Hewlett-Packard Development Company, L.P. Methods and apparatus for recovering from fatal errors in a system
US20070136290A1 (en) * 2005-12-07 2007-06-14 Microsoft Corporation Removal of unnecessary read-to-update upgrades in software transactional memory
US20070169030A1 (en) * 2005-12-07 2007-07-19 Microsoft Corporation Compiler support for optimizing decomposed software transactional memory operations
US20070180217A1 (en) * 2006-01-27 2007-08-02 Silicon Graphics, Inc. Translation lookaside buffer checkpoint system
US20070288529A1 (en) * 2006-06-09 2007-12-13 Oracle International Corporation Framework to optimize delete all rows operations on database objects
US20100293532A1 (en) * 2009-05-13 2010-11-18 Henrique Andrade Failure recovery for stream processing applications
US7895164B1 (en) * 2007-03-13 2011-02-22 Librato, Inc. Efficient checkpoint process
US20110239048A1 (en) * 2010-03-29 2011-09-29 International Business Machines Corporation Partial fault tolerant stream processing applications
US20120246405A1 (en) * 2011-03-25 2012-09-27 Axel Schroeder Delayed freeing of data storage blocks
US8527546B2 (en) 2010-11-25 2013-09-03 International Business Machines Corporation Generating a checkpoint image for use with an in-memory database
US20140172803A1 (en) * 2012-12-19 2014-06-19 Microsoft Corporation Main-memory database checkpointing
US20140297918A1 (en) * 2013-03-29 2014-10-02 Ewha University-Industry Collaboration Foundation Buffer cache apparatus, journaling file system and journaling method for incorporating journaling features within non-volatile buffer cache
US20140344394A1 (en) * 2007-10-09 2014-11-20 Cleversafe, Inc. Revision Deletion Markers
US20150058295A1 (en) * 2012-05-02 2015-02-26 Huawei Technologies Co., Ltd. Data Persistence Processing Method and Apparatus, and Database System
US20150149704A1 (en) * 2013-11-26 2015-05-28 Juchang Lee Transaction Private Log Buffering for High Performance of Transaction Processing
US20150220405A1 (en) * 2012-10-12 2015-08-06 International Business Machines Corporation In-memory continuous data protection
US20150261620A1 (en) * 2014-03-13 2015-09-17 Carlos Ruiz Systems and methods for reducing load database time
US9149054B2 (en) 2011-07-06 2015-10-06 International Business Machines Corporation Prefix-based leaf node storage for database system
CN106547477A (en) * 2015-09-22 2017-03-29 伊姆西公司 For the method and apparatus for reducing buffer memory device online
US9678837B1 (en) 2016-10-14 2017-06-13 International Business Machines Corporation Variable checkpointing in a streaming application with one or more consistent regions
US9720785B1 (en) * 2016-10-14 2017-08-01 International Business Machines Corporation Variable checkpointing in a streaming application that includes tuple windows
US11086850B2 (en) 2011-04-13 2021-08-10 International Business Machines Corporation Persisting of a low latency in-memory database

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7818610B2 (en) * 2007-09-27 2010-10-19 Microsoft Corporation Rapid crash recovery for flash storage
US8626713B2 (en) * 2010-12-08 2014-01-07 International Business Machines Corporation Multiple contexts in a redirect on write file system
US8904006B2 (en) 2010-12-08 2014-12-02 International Business Machines Corporation In-flight block map for a clustered redirect-on-write filesystem
US9619539B2 (en) * 2012-09-28 2017-04-11 Vmware, Inc. Automated document replication in a distributed computing system
WO2014162541A1 (en) * 2013-04-03 2014-10-09 株式会社日立製作所 Method for changing access routes in disk-array system
GB2515501A (en) 2013-06-25 2014-12-31 Ibm Replication for on-line hot-standby database

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5864849A (en) * 1996-12-16 1999-01-26 Lucent Technologies Inc. System and method for restoring a multiple checkpointed database in view of loss of volatile memory
US5881379A (en) * 1996-05-20 1999-03-09 International Business Machines Corporation System, method, and program for using duplicated direct pointer sets in keyed database records to enhance data recoverability without logging
US6108671A (en) * 1997-04-01 2000-08-22 Ogawa; Atsuro Virtual database space system and computer-readable recording medium recorded with database program
US6154847A (en) * 1993-09-02 2000-11-28 International Business Machines Corporation Method and system for performing resource updates and recovering operational records within a fault-tolerant transaction-oriented data processing system
US20020103814A1 (en) * 2000-12-12 2002-08-01 Edouard Duvillier High speed, non-log based database recovery technique
US20030056143A1 (en) * 2001-09-14 2003-03-20 Prabhu Manohar Karkal Checkpointing with a write back controller
US6560614B1 (en) * 1999-11-12 2003-05-06 Xosoft Inc. Nonintrusive update of files
US6578041B1 (en) * 2000-06-30 2003-06-10 Microsoft Corporation High speed on-line backup when using logical log operations

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6154847A (en) * 1993-09-02 2000-11-28 International Business Machines Corporation Method and system for performing resource updates and recovering operational records within a fault-tolerant transaction-oriented data processing system
US5881379A (en) * 1996-05-20 1999-03-09 International Business Machines Corporation System, method, and program for using duplicated direct pointer sets in keyed database records to enhance data recoverability without logging
US5864849A (en) * 1996-12-16 1999-01-26 Lucent Technologies Inc. System and method for restoring a multiple checkpointed database in view of loss of volatile memory
US6108671A (en) * 1997-04-01 2000-08-22 Ogawa; Atsuro Virtual database space system and computer-readable recording medium recorded with database program
US6560614B1 (en) * 1999-11-12 2003-05-06 Xosoft Inc. Nonintrusive update of files
US6578041B1 (en) * 2000-06-30 2003-06-10 Microsoft Corporation High speed on-line backup when using logical log operations
US20020103814A1 (en) * 2000-12-12 2002-08-01 Edouard Duvillier High speed, non-log based database recovery technique
US20030056143A1 (en) * 2001-09-14 2003-03-20 Prabhu Manohar Karkal Checkpointing with a write back controller

Cited By (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060253502A1 (en) * 2005-05-06 2006-11-09 Microsoft Corporation Maintenance of link level consistency between database and file system
US8145686B2 (en) * 2005-05-06 2012-03-27 Microsoft Corporation Maintenance of link level consistency between database and file system
US20070043975A1 (en) * 2005-08-16 2007-02-22 Hewlett-Packard Development Company, L.P. Methods and apparatus for recovering from fatal errors in a system
US7853825B2 (en) * 2005-08-16 2010-12-14 Hewlett-Packard Development Company, L.P. Methods and apparatus for recovering from fatal errors in a system
US20070143276A1 (en) * 2005-12-07 2007-06-21 Microsoft Corporation Implementing strong atomicity in software transactional memory
US20070169031A1 (en) * 2005-12-07 2007-07-19 Microsoft Corporation Efficient placement of software transactional memory operations around procedure calls
US20070169030A1 (en) * 2005-12-07 2007-07-19 Microsoft Corporation Compiler support for optimizing decomposed software transactional memory operations
US8099726B2 (en) * 2005-12-07 2012-01-17 Microsoft Corporation Implementing strong atomicity in software transactional memory
US7810085B2 (en) 2005-12-07 2010-10-05 Microsoft Corporation Removal of unnecessary read-to-update upgrades in software transactional memory
US8799882B2 (en) 2005-12-07 2014-08-05 Microsoft Corporation Compiler support for optimizing decomposed software transactional memory operations
US20070136365A1 (en) * 2005-12-07 2007-06-14 Microsoft Corporation Reducing unnecessary software transactional memory operations on newly-allocated data
US7861237B2 (en) 2005-12-07 2010-12-28 Microsoft Corporation Reducing unnecessary software transactional memory operations on newly-allocated data
US8266609B2 (en) 2005-12-07 2012-09-11 Microsoft Corporation Efficient placement of software transactional memory operations around procedure calls
US20070136290A1 (en) * 2005-12-07 2007-06-14 Microsoft Corporation Removal of unnecessary read-to-update upgrades in software transactional memory
US20070180217A1 (en) * 2006-01-27 2007-08-02 Silicon Graphics, Inc. Translation lookaside buffer checkpoint system
US7913057B2 (en) * 2006-01-27 2011-03-22 Graphics Properties Holdings, Inc. Translation lookaside buffer checkpoint system
US8856083B2 (en) * 2006-06-09 2014-10-07 Oracle International Corporation Framework to optimize delete all row operations on database objects to improve throughput, query ability and flashback
US20070288529A1 (en) * 2006-06-09 2007-12-13 Oracle International Corporation Framework to optimize delete all rows operations on database objects
US7895164B1 (en) * 2007-03-13 2011-02-22 Librato, Inc. Efficient checkpoint process
US9576018B2 (en) * 2007-10-09 2017-02-21 International Business Machines Corporation Revision deletion markers
US20140344394A1 (en) * 2007-10-09 2014-11-20 Cleversafe, Inc. Revision Deletion Markers
US8949801B2 (en) * 2009-05-13 2015-02-03 International Business Machines Corporation Failure recovery for stream processing applications
US20100293532A1 (en) * 2009-05-13 2010-11-18 Henrique Andrade Failure recovery for stream processing applications
US20110239048A1 (en) * 2010-03-29 2011-09-29 International Business Machines Corporation Partial fault tolerant stream processing applications
US8997039B2 (en) 2010-03-29 2015-03-31 International Business Machines Corporation Injecting a fault into a stream operator in a data stream processing application
US8458650B2 (en) 2010-03-29 2013-06-04 International Business Machines Corporation Injecting a fault into a stream operator in a data stream processing application
US8543613B2 (en) 2010-11-25 2013-09-24 International Business Machines Corporation Generating a checkpoint image for use with an in-memory database
US8527546B2 (en) 2010-11-25 2013-09-03 International Business Machines Corporation Generating a checkpoint image for use with an in-memory database
US8615631B2 (en) * 2011-03-25 2013-12-24 Sap Ag Delayed freeing of data storage blocks
US20120246405A1 (en) * 2011-03-25 2012-09-27 Axel Schroeder Delayed freeing of data storage blocks
US11086850B2 (en) 2011-04-13 2021-08-10 International Business Machines Corporation Persisting of a low latency in-memory database
US9149054B2 (en) 2011-07-06 2015-10-06 International Business Machines Corporation Prefix-based leaf node storage for database system
US9155320B2 (en) 2011-07-06 2015-10-13 International Business Machines Corporation Prefix-based leaf node storage for database system
US20150058295A1 (en) * 2012-05-02 2015-02-26 Huawei Technologies Co., Ltd. Data Persistence Processing Method and Apparatus, and Database System
US20150220405A1 (en) * 2012-10-12 2015-08-06 International Business Machines Corporation In-memory continuous data protection
US10055304B2 (en) * 2012-10-24 2018-08-21 International Business Machines Corporation In-memory continuous data protection
US10318648B2 (en) * 2012-12-19 2019-06-11 Microsoft Technology Licensing, Llc Main-memory database checkpointing
US20140172803A1 (en) * 2012-12-19 2014-06-19 Microsoft Corporation Main-memory database checkpointing
US20160078044A1 (en) * 2012-12-19 2016-03-17 Microsoft Technology Licensing, Llc Main-memory database checkpointing
US9304998B2 (en) * 2012-12-19 2016-04-05 Microsoft Technology Licensing, Llc Main-memory database checkpointing
US20140297918A1 (en) * 2013-03-29 2014-10-02 Ewha University-Industry Collaboration Foundation Buffer cache apparatus, journaling file system and journaling method for incorporating journaling features within non-volatile buffer cache
US10152416B2 (en) * 2013-03-29 2018-12-11 Ewha University-Industry Collaboration Foundation Buffer cache apparatus, journaling file system and journaling method for incorporating journaling features within non-volatile buffer cache
US9558229B2 (en) * 2013-11-26 2017-01-31 Sap Se Transaction private log buffering for high performance of transaction processing
US20150149704A1 (en) * 2013-11-26 2015-05-28 Juchang Lee Transaction Private Log Buffering for High Performance of Transaction Processing
US9471439B2 (en) * 2014-03-13 2016-10-18 Sybase, Inc. Systems and methods for reducing load database time
US20150261620A1 (en) * 2014-03-13 2015-09-17 Carlos Ruiz Systems and methods for reducing load database time
US10387308B2 (en) * 2015-09-22 2019-08-20 EMC IP Holding Company LLC Method and apparatus for online reducing caching devices
CN106547477A (en) * 2015-09-22 2017-03-29 伊姆西公司 For the method and apparatus for reducing buffer memory device online
US20170103020A1 (en) * 2015-09-22 2017-04-13 EMC IP Holding Company LLC Method and apparatus for online reducing caching devices
US9678837B1 (en) 2016-10-14 2017-06-13 International Business Machines Corporation Variable checkpointing in a streaming application with one or more consistent regions
US10375137B2 (en) 2016-10-14 2019-08-06 International Business Machines Corporation Variable checkpointing in a streaming application that includes tuple windows
US10360109B2 (en) 2016-10-14 2019-07-23 International Business Machines Corporation Variable checkpointing in a streaming application with one or more consistent regions
US10671489B2 (en) 2016-10-14 2020-06-02 International Business Machines Corporation Variable checkpointing in a streaming application with one or more consistent regions
US10671490B2 (en) 2016-10-14 2020-06-02 International Business Machines Corporation Variable checkpointing in a streaming application with one or more consistent regions
US9720785B1 (en) * 2016-10-14 2017-08-01 International Business Machines Corporation Variable checkpointing in a streaming application that includes tuple windows

Also Published As

Publication number Publication date
US7587429B2 (en) 2009-09-08

Similar Documents

Publication Publication Date Title
US7587429B2 (en) Method for checkpointing a main-memory database
US6185699B1 (en) Method and apparatus providing system availability during DBMS restart recovery
US6651073B1 (en) Method and apparatus for insuring database data integrity without data recovery logging
EP2452261B1 (en) Apparatus and method for read optimized bulk data storage
US6567928B1 (en) Method and apparatus for efficiently recovering from a failure in a database that includes unlogged objects
EP3111347B1 (en) Efficient methods and systems for consistent read in record-based multi-version concurrency control
US7133884B1 (en) Unobtrusive point-in-time consistent copies
US10585876B2 (en) Providing snapshot isolation to a database management system
US5369757A (en) Recovery logging in the presence of snapshot files by ordering of buffer pool flushing
US6976022B2 (en) Method and mechanism for batch processing transaction logging records
US6981004B2 (en) Method and mechanism for implementing in-memory transaction logging records
EP0501160A2 (en) Intelligent page store for concurrent and consistent access to a database by a transaction processor and a query processor
US8296269B2 (en) Apparatus and method for read consistency in a log mining system
EP0762302A1 (en) Single transaction technique for a journaling file system of a computer operating system
CN109871386A (en) Multi version concurrency control (MVCC) in nonvolatile memory
US11748212B1 (en) Method and apparatus for resolving automatic transaction facility (ATF) failures
US8452730B2 (en) Archiving method and system
Faria et al. Towards generic fine-grained transaction isolation in polystores
JP7423534B2 (en) Consistency between key-value stores with shared journals
Sheng Non-blocking Lazy Schema Changes in Multi-Version Database Management Systems
CN114816224A (en) Data management method and data management device
CN115576494B (en) Data storage method and computing device
CN117389696A (en) Parallel recovery method and storage medium applied to OLTP memory database
Taylor Concurrency in the data warehouse
CN115221145A (en) Method and system for solving PostgreSQL database table expansion based on Undo table space

Legal Events

Date Code Title Description
AS Assignment

Owner name: SOLID INFORMATION TECHNOLOGY OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIEDES, ANTTI-PEKKA;SOINI, PETRI;REEL/FRAME:014960/0957;SIGNING DATES FROM 20040603 TO 20040607

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

CC Certificate of correction
AS Assignment

Owner name: OY INTERNATIONAL BUSINESS MACHINES AB, SWITZERLAND

Free format text: MERGER;ASSIGNOR:SOLID INFORMATION TECHNOLOGY OY;REEL/FRAME:025486/0469

Effective date: 20100531

AS Assignment

Owner name: OY INTERNATIONAL BUSINESS MACHINES AB, FINLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ERROR IN THE RECEIVING PARTY ADDRESS IN A COVER SHEET PREVIOUSLY RECORDED ON REEL 025486 FRAME 0469. ASSIGNOR(S) HEREBY CONFIRMS THE RECEIVING PARTY IBM, HAS RECEIVED THE ENTIRE RIGHT, TITLE AND INTEREST IN ALL OF THE PATENTS AND APPLICATIONS OWNED BY SOLID;ASSIGNOR:SOLID TECHNOLOGY OY;REEL/FRAME:025647/0691

Effective date: 20100531

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20130908